A project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is …

A project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is …
A Nim implementation of reflective PE-Loading from memory. The base for this code was taken from RunPE-In-Memory – which I …
Hunt & Hackett presents a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution …
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and …
Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via …
AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the help of Carbon …
x86 32bits emulator, for securely emulating shellcodes. Features rust safety, good for malware. All dependencies are in rust. zero unsafe{} …
SMBeagle is an (SMB) fileshare auditing tool that hunts out all files it can see in the network and reports …
kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun) ASN.1 library In …
ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by; …