Abstract This tools detects the artifact of the PowerShell based malware from the eventlog of PowerShell logging.Online Demo Install git …

Abstract This tools detects the artifact of the PowerShell based malware from the eventlog of PowerShell logging.Online Demo Install git …
Extensible Azure Security Tool (Later referred as E.A.S.T) is tool for assessing Azure and to some extent Azure AD security …
PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out …
Multithreaded C# .NET Assembly Local Administrative Privilege Enumeration Arguments ./LACheck.exe help _ _____ _ _ | | /\ / ____| …
Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions …
Ring 3 rootkit r77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named …
CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network …
The idea is to “translate” Windows OS privileges to a path leading to: administrator, integrity and/or confidentiality threat, availability threat, …
Introducing TScopy It is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on …
A simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a …