Processus (ProcessusT)

ProcessusT

User data from Github https://github.com/ProcessusT

Company:Les tutos de Processus

Location:Reims, France

Home Page:https://processus.site

GitHub:@ProcessusT

Twitter:@ProcessusT

Processus's repositories

HEKATOMB

Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.

Language:PythonLicense:GPL-3.0Stargazers:521Issues:14Issues:9

Venoma

Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution

Dictofuscation

Obfuscate the bytes of your payload with an association dictionary

Language:PythonLicense:GPL-3.0Stargazers:70Issues:2Issues:0

UnhookingDLL

This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hollowing

PsNotifRoutineUnloader

This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCreateThreadNotifyRoutine from ESET Security to bypass the driver detection

Language:C++Stargazers:63Issues:3Issues:0

SharpVenoma

CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution

HavocHub

PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are relayed through Issues and Comments for maximum stealth.

Language:PythonLicense:GPL-3.0Stargazers:39Issues:0Issues:0

MasterKeyBrute

Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager

Language:PythonLicense:GPL-3.0Stargazers:22Issues:1Issues:1

EnumSSN

Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current process

Language:C++Stargazers:21Issues:3Issues:0

Automated-C2

Automate your C2 creation with Azure Frontdoor and randomly generated options

Language:PythonLicense:GPL-3.0Stargazers:15Issues:2Issues:1

La-Gamelle

Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...

Language:PythonStargazers:14Issues:4Issues:0

RemClip

RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control

Language:PHPLicense:GPL-3.0Stargazers:13Issues:2Issues:2

LoadThatPE

A simple PE Loader tool that loads a PE from memory, decrypt it, resolve its imports, relocate its sections, and redefine its entry point to execute seamlessly from memory

Language:C++License:GPL-3.0Stargazers:12Issues:3Issues:0

DetectEsetHooks

Tool to enumerate ESET hooked functions by parsing the ebehmoni.dll module

Language:C++Stargazers:9Issues:2Issues:0

MikNet

Autonomous red team implementation allowing sound capture and broadcast through an untraceable front-end server to the attacker's station

License:GPL-3.0Stargazers:8Issues:1Issues:0

VolchockC2

VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and adversary simulation, VolchockC2 focuses on flexibility, stealth, and efficient post-exploitation capabilities.

Language:PythonLicense:GPL-3.0Stargazers:7Issues:0Issues:0

IndirectSyscalls

A custom reimplementation of indirect syscalls without the use of GetModuleHandleA and GetProcAddress

Language:C++Stargazers:4Issues:2Issues:0

aspyco

Aspyco is a python script that permits to upload a local binary through SMB on a remote host. Then it remotely connects to svcctl named pipe through DCERPC to create and start the binary as a service.

Language:PythonLicense:GPL-3.0Stargazers:3Issues:1Issues:0

CodeCaveInjection

Test d'injection de shellcode dans un fichier PE 64bits

Language:C++Stargazers:2Issues:3Issues:0

ESEDHOUND

ESEDHOUND is a python script that extract datatable from the ntds.dit file to retrieve users, computers and groups. The goal is to send all the infos into Bloodhound to help incident responders for identifying AD objects.

Language:PythonLicense:GPL-3.0Stargazers:2Issues:1Issues:0

invit-bomber

Script python permettant d'envoyer en masse des invitations sur LinkedIn

Language:PythonStargazers:2Issues:1Issues:0

Araneus

Je sais pas trop encore, on verra

Language:PythonStargazers:1Issues:1Issues:0

AuthenticationPassthroughExploitation

Another example of Azure AD Authentication Passthrough exploitation to intercept LogonUserW API calls

Language:C++License:GPL-3.0Stargazers:1Issues:1Issues:0

blackarch

An ArchLinux based distribution for penetration testers and security researchers.

Language:ShellLicense:NOASSERTIONStargazers:1Issues:0Issues:0

Havoc

The Havoc Framework

Language:GoLicense:GPL-3.0Stargazers:1Issues:0Issues:0

Killer

Is a tool created to evade AVs and EDRs or security tools.

Language:C++Stargazers:1Issues:0Issues:0

libesedb

Library and tools to access the Extensible Storage Engine (ESE) Database File (EDB) format.

Language:CLicense:LGPL-3.0Stargazers:1Issues:0Issues:0

RedTeaming-Tactics-and-Techniques

Red Teaming Tactics and Techniques

Language:PowerShellStargazers:1Issues:0Issues:0
Language:PowerShellStargazers:0Issues:1Issues:0

NetExec

The Network Execution Tool

Language:PythonLicense:BSD-2-ClauseStargazers:0Issues:0Issues:0