In the ever-evolving landscape of cybersecurity, the need for robust tools that aid Bug Bounty programs, Penetration Testing (Pentest), and…
Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration. The intriguing world of…
Source generator to add D/Invoke and indirect syscall methods to a C# project. A game-changer for C# developers, CsWhispers is…
Write XLL Dropper in c++ , a red teams most used dropper , learn how to be like a red…
DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint…
This project aims to reimplement the C++ standard library functionality using the C programming language. It provides C developers with…
The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity…
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd…
An modern 64-bit position independent implant template. raw strings global instance compile time hashing #include <Common.h> #include <Constexpr.h> FUNC VOID…
Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds…