dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a …
HardHatC2 – A C# Command And Control Framework
A cross-platform, collaborative, Command & Control framework written in C#, designed for red teaming and ease of use. HardHat is …
DotDumper – An Automatic Unpacker And Logger For DotNet Framework Targeting Files
An automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022. …
FUD-UUID-Shellcode – Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings madness
Introduction Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings …
OffensiveVBA – Code Execution And AV Evasion Methods For Macros In Office Documents
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and …
SMB-Session-Spoofing – Tool To Create A Fake SMB Session
Welcome! This is a utility that can be compiled with Visual Studio 2019 (or newer). The goal of this program …
EDRSandblast – Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And LSASS Protections
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and …
PMAT-labs – Labs For Practical Malware Analysis And Triage
Read this carefully before proceeding. This repository contains live malware samples for use in the Practical Malware Analysis & Triage …
Jektor – A Windows User-Mode Shellcode Execution Tool That Demonstrates Various Techniques That Malware Uses
This utility focuses on shellcode injection techniques to demonstrate methods that malware may use to execute shellcode on a victim …
EXOCET – AV-evading, Undetectable, Payload Delivery Tool
EXOCET is superior to Metasploit’s “Evasive Payloads” modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit’s Evasion Payloads …