Security Scorecards - Security Health Metrics For Open Source Security Scorecards - Security Health Metrics For Open Source Reviewed by Zion3R on 5:30 PM Rating: 5
WFH - Windows Feature Hunter WFH - Windows Feature Hunter Reviewed by Zion3R on 8:30 AM Rating: 5
FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
Backstab - A Tool To Kill Antimalware Protected Processes Backstab - A Tool To Kill Antimalware Protected Processes Reviewed by Zion3R on 8:30 AM Rating: 5
DarkLoadLibrary - LoadLibrary For Offensive Operations DarkLoadLibrary - LoadLibrary For Offensive Operations Reviewed by Zion3R on 5:30 PM Rating: 5
Squalr - Squalr Memory Editor - Game Hacking Tool Written In C# Squalr - Squalr Memory Editor - Game Hacking Tool Written In C# Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps Reviewed by Zion3R on 8:30 AM Rating: 5
NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation Reviewed by Zion3R on 5:30 PM Rating: 5
FalconEye - Real-time detection software for Windows process injections FalconEye - Real-time detection software for Windows process injections Reviewed by Zion3R on 5:30 PM Rating: 5
Rustcat - Netcat Alternative Rustcat - Netcat Alternative Reviewed by Zion3R on 8:30 AM Rating: 5
PPLdump - Dump The Memory Of A PPL With A Userland Exploit PPLdump - Dump The Memory Of A PPL With A Userland Exploit Reviewed by Zion3R on 5:30 PM Rating: 5
TChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine TChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine Reviewed by Zion3R on 5:30 PM Rating: 5
Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS Reviewed by Zion3R on 5:30 PM Rating: 5
BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D Reviewed by Zion3R on 8:30 AM Rating: 5
ColdFire - Golang Malware Development Library ColdFire - Golang Malware Development Library Reviewed by Zion3R on 5:30 PM Rating: 5
Link - A Command And Control Framework Written In Rust Link - A Command And Control Framework Written In Rust Reviewed by Zion3R on 8:30 AM Rating: 5
Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS Reviewed by Zion3R on 5:30 PM Rating: 5
Onelinepy - Python Obfuscator To Generate One-Liners And FUD Payloads Onelinepy - Python Obfuscator To Generate One-Liners And FUD Payloads Reviewed by Zion3R on 5:30 PM Rating: 5
Dent - A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft's WDAPT Sensors Dent - A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft's WDAPT Sensors Reviewed by Zion3R on 6:18 PM Rating: 5
HookDump - Security Product Hook Detection HookDump - Security Product Hook Detection Reviewed by Zion3R on 5:30 PM Rating: 5