Azure Outlook C2 – Unveiling Remote Control Of Windows Devices Via Outlook Mailbox
Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration.
The intriguing world of 'Azure Outlook C2,' a...
CsWhispers – Supercharge Your C# Project With D/Invoke And Indirect Syscalls
Source generator to add D/Invoke and indirect syscall methods to a C# project.
A game-changer for C# developers, CsWhispers is a source generator that...
XLL Dropper – Mastering A Red Team’s Ultimate Weapon
Write XLL Dropper in c++ , a red teams most used dropper , learn how to be like a red teams and APT groups...
ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode
DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint has access to attacker-controlled...
Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide
The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created...
VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Usage:
cd /tmp && git clone https://github.com/drak3hft7/VPS-Bug-Bounty-Tools
cd VPS-Bug-Bounty-Tools
sudo...
Stardust – A Deep Dive Into A 64-Bit Position Independent Implant Template
An modern 64-bit position independent implant template.
raw strings
global instance
compile time hashing
#include <Common.h>
#include <Constexpr.h>
FUNC VOID Main(
_In_ PVOID Param
) {
...
Automated Emulation – Building A Customizable Breach And Attack Simulation Lab With AWS And...
Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds the following resources hosted...
CVE-2023-22527 in Confluence : A Step-by-Step Guide And Its Implications
In the world of cybersecurity, staying informed about the latest vulnerabilities is crucial. One such vulnerability that has garnered attention is CVE-2023-22527 in Confluence,...
YaraDbg – Simplifying Yara Rule Development And Analysis For Security Analysts
YaraDbg is a free web-based Yara debugger to help security analysts to write hunting or detection rules with less effort and more confidence.
By...