No-Consolation – Executing Unmanaged PEs Inline And Without Console Allocation

2 years ago

This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console…

InvisibilityCloak – A Game-Changer In C# Post-Exploitation Tools

2 years ago

Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change…

Awesome-BEC – Unveiling A Comprehensive Resource For Business Email Compromise Investigations

2 years ago

A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains…

SharpVeeamDecryptor – Unlocking The Secrets Of Veeam

2 years ago

Decrypt Veeam database passwords. Needs to be run from an elevated context on the Veeam Backup/Database Server. I did not…

Honeypots Detection – Using Nuclei Templates For Effective Detection

2 years ago

Nuclei templates for honeypots detection. This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot,…

Callstack Spoofing + Indirect Syscalls POC – Unmasking Evasion Techniques In A Proof Of Concept (POC) Scenario

2 years ago

This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined…

Install And Secure – A Guide To Using ‘ldeep’ With Kerberos For Advanced Active Directory Analysis

2 years ago

In the realm of network security and Active Directory assessment, efficient reconnaissance is paramount. This article explores the installation and…

LdrLibraryEx – A Lightweight x64 Library For Loading DLLs Into Memory

2 years ago

A small x64 library to load dll's into memory. n the world of software development, efficient DLL loading is a…

GCR – Google Calendar RAT

2 years ago

Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…

Technical Analysis Of BiBi – Windows Wiper Targeting Israeli Organizations

2 years ago

On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…