Kara-4search's starred repositories
quivr
Your GenAI Second Brain 🧠 A personal productivity assistant (RAG) ⚡️🤖 Chat with your docs (PDF, CSV, ...) & apps using Langchain, GPT 3.5 / 4 turbo, Private, Anthropic, VertexAI, Ollama, LLMs, that you can share with users ! Local & Private alternative to OpenAI GPTs & ChatGPT powered by retrieval-augmented generation.
HiddenDesktop
HVNC for Cobalt Strike
Artfuscator
A C compiler targeting an artistically pleasing nightmare for reverse engineers
Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
CheckPlease
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
RunPE-In-Memory
Run a Exe File (PE Module) in memory (like an Application Loader)
KillDefender
A small POC to make defender useless by removing its token privileges and lowering the token integrity
WinDefenderKiller
Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys
LdrLockLiberator
For when DLLMain is the only way
sharem
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
ContainYourself
A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.
Jormungandr
Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.
SignatureGate
Weaponized HellsGate/SigFlip
llvm-msvc-build
This project migrated to https://github.com/backengineering/llvm-msvc
cmd2shellcode
cmd2shellcode
CVE-2023-36168
An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component
LdrLibraryEx
A small x64 library to load dll's into memory.
Huorong_Vulnerabilities
Huorong Internet Security vulnerabilities 火绒安全软件漏洞