Farrim Wildaxe's repositories
BounceBack
↕️🤫 Stealth redirector for your red team operation security
CallstackSpoofingPOC
C++ self-Injecting dropper based on various EDR evasion techniques.
cnext-exploits
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
docsthebox
HackTheBox Machines to Notion Database for Writeups
git_rce
Exploit PoC for CVE-2024-32002
hook
Hook for the PoC for exploiting CVE-2024-32002
Hypnos
A more reliable way of resolving syscall numbers in Windows
llvm-yx-callobfuscator
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
NovaLdr
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
NtRemoteLoad
Remote Shellcode Injector
OSCE3-Complete-Guide
OSWE, OSEP, OSED, OSEE
PrivFu
Kernel mode WinDbg extension and PoCs for token privilege investigation.
Proxy-DLL-Loads
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
ropr
A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
rp-bf.rs
rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump
RustHound
Active Directory data collector for BloodHound written in Rust. 🦀
RustPacker
Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.
RustRedOps
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
sliver
Adversary Emulation Framework
Split
Apply a divide and conquer approach to bypass EDRs
TJ-JPT
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
Unwinder
Call stack spoofing for Rust.
win32-shellcode
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
WTSImpersonator
WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"