Processus's repositories
Dictofuscation
Obfuscate the bytes of your payload with an association dictionary
UnhookingDLL
This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hollowing
PsNotifRoutineUnloader
This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCreateThreadNotifyRoutine from ESET Security to bypass the driver detection
SharpVenoma
CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution
MasterKeyBrute
Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager
Automated-C2
Automate your C2 creation with Azure Frontdoor and randomly generated options
La-Gamelle
Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...
LoadThatPE
A simple PE Loader tool that loads a PE from memory, decrypt it, resolve its imports, relocate its sections, and redefine its entry point to execute seamlessly from memory
DetectEsetHooks
Tool to enumerate ESET hooked functions by parsing the ebehmoni.dll module
VolchockC2
VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and adversary simulation, VolchockC2 focuses on flexibility, stealth, and efficient post-exploitation capabilities.
IndirectSyscalls
A custom reimplementation of indirect syscalls without the use of GetModuleHandleA and GetProcAddress
CodeCaveInjection
Test d'injection de shellcode dans un fichier PE 64bits
invit-bomber
Script python permettant d'envoyer en masse des invitations sur LinkedIn
AuthenticationPassthroughExploitation
Another example of Azure AD Authentication Passthrough exploitation to intercept LogonUserW API calls
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
NetExec
The Network Execution Tool