Ap3x's starred repositories
Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
interceptor
Sample Rust Hooking Engine
lsa-whisperer
Tools for interacting with authentication packages using their individual message protocols
PolyHook_2_0
C++20, x86/x64 Hooking Libary v2.0
HandleKatz
PIC lsass dumper using cloned handles
hiding-your-syscalls
Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.
WFPCalloutReserach
research revolving the windows filtering platform callout mechanism
IoRingReadWritePrimitive
Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2
TiEtwAgent
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
SealighterTI
Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider
Beacon_Source
not a reverse-engineered version of the Cobalt Strike Beacon
NativeDump
Dump lsass using only Native APIs by hand-crafting Minidump files (without MinidumpWriteDump!)
lycanthropy
Java DNS Post Exploitation Tool
awesome-game-security
awesome game security [Welcome to PR]