Usman Sikander's Projects
Phising 2FA Gmail
Bypass 2FA Instagram
This is Advance Phishing Tool ! OTP PHISHING
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
This repository includes the powershell scripts. One script is used to convert any EXE file into hexadecimal format and other script can execute converted hex. Converted hex will upload on server and you can get hex, create EXE and execute it. This technique will help to bypass network level security controls.
Powerfull scripts to bypass windows defender
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Dump NTDS with golden certificates and UnPAC the hash
I have created a python based exploit which is getting Username, Passwords, Url's from Google Chrome
Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several missi
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
Stop Windows Defender using the Win32 API
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Documents Exfiltration project for fun and educational purposes
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
Data-Exfiltration using FTP service
Miscellaneous exploit code
Fake Windows logon screen to steal passwords
Ask a TGS on behalf of another user without password
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
VBA script to download anything from internet
Welcome to the Malware Analysis Toolkit repository, your comprehensive resource for dissecting and understanding the intricate world of malware. This repository is dedicated to providing in-depth technical analysis of various malware strains, equipping security professionals, researchers, and enthusiasts with the knowledge
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
Codebase to generate an msdt-follina payload
Noriben - Portable, Simple, Malware Analysis Sandbox