Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change…
A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains…
Decrypt Veeam database passwords. Needs to be run from an elevated context on the Veeam Backup/Database Server. I did not…
Nuclei templates for honeypots detection. This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot,…
This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined…
In the realm of network security and Active Directory assessment, efficient reconnaissance is paramount. This article explores the installation and…
A small x64 library to load dll's into memory. n the world of software development, efficient DLL loading is a…
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…
On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…
The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers…