Giter VIP home page Giter VIP logo

๐Ÿ‡ I took the red pill ๐Ÿ”ด

Mukarram Khalid's Projects

adexplorersnapshot.py icon adexplorersnapshot.py

ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.

admodule icon admodule

Microsoft signed ActiveDirectory PowerShell module

adpt icon adpt

DLL proxying for lazy people

amsi_veh icon amsi_veh

A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.

androidfridabeginnersbook icon androidfridabeginnersbook

ใ€Šๅฎ‰ๅ“Frida้€†ๅ‘ไธŽๆŠ“ๅŒ…ๅฎžๆˆ˜ใ€‹้šไนฆ้™„ไปถ

beacon_source icon beacon_source

not a reverse-engineered version of the Cobalt Strike Beacon

clroxide icon clroxide

A rust library that allows you to host the CLR and execute dotnet binaries.

cnext-exploits icon cnext-exploits

Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()

crtp-notes icon crtp-notes

My notes containing the Certified Red Team Professional Course

cswhispers icon cswhispers

Source generator to add D/Invoke and indirect syscall methods to a C# project.

darkwidow icon darkwidow

Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing

deadpotato icon deadpotato

DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.

dojoloader icon dojoloader

Generic PE loader for fast prototyping evasion techniques

edr-preloader icon edr-preloader

An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer

freeze.rs icon freeze.rs

Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST

frida-labs icon frida-labs

The repo contains a series of challenges for learning Frida for Android Exploitation.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.