GithubHelp home page GithubHelp logo

Real's Projects

apollo icon apollo

A .NET Framework 4.0 Windows Agent

asmhalosgate icon asmhalosgate

x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks

bifrost icon bifrost

Objective-C library and console to interact with Heimdal APIs for macOS Kerberos

c2-tool-collection icon c2-tool-collection

A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.

coercer icon coercer

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.

cordyceps icon cordyceps

C++ self-Injecting dropper based on various EDR evasion techniques.

ekko_cfg_bypass icon ekko_cfg_bypass

A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process

evilsln icon evilsln

A New Exploitation Technique for Visual Studio Projects

fortress icon fortress

FUD MAC Loader , with Indirect syscall dynamic syscall , get function address from the peb , function hash comparaison . Tested on Sentinel1 & Crowdstrike , no prevention/detection

freshycalls icon freshycalls

FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!

freshycalls_poc icon freshycalls_poc

A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯

g0t-b0r3d icon g0t-b0r3d

A bunch of code and scripts I wrote because I was bored.

github-firehose icon github-firehose

#OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API

gogetcrawl icon gogetcrawl

Extract web archive data using Wayback Machine and Common Crawl

h4cks icon h4cks

Combination of all my Resources, Links & Scripts

hiding-your-syscalls icon hiding-your-syscalls

Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.

iat-hooking-revisited icon iat-hooking-revisited

Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.