RunOnceEx's repositories
1earn
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
Antivirus-Artifacts
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
Beacon
Open Source Cobalt Strike Beacon. Unreleased, in research stages.
bypass-av-note
免杀技术大杂烩---乱拳打死老师傅
COFFInjector
PoC MSVC COFF Object file loader/injector.
ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
DoppelGate
DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userland Hooking.
inline_syscall
Inline syscalls made easy for windows on clang
kopycat
Linux Kernel module-less implant (backdoor)
link
link is a command and control framework written in rust
LsassSilentProcessExit
Command line interface to dump LSASS memory to disk via SilentProcessExit
memexec
A library for loading and executing PE (Portable Executable) from memory without ever touching the disk
memlib-rs
A cross platform memory hacking library written in Rust aimed at cheat development.
min-sized-rust
🦀 How to minimize Rust binary size 📦
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
pfsense
Main repository for pfSense
PIC-Get-Privileges
Building and Executing Position Independent Shellcode from Object Files in Memory
rootkit-arsenal-guacamole
An attempt to restore and adapt to modern Win10 version the Rootkit Arsenal original code sampls
rs-winapi2
Microsoft Windows user-mode API access with clean Rust types.
rust-windows-shellcode
Windows shellcode development in Rust
shieldwall
zero-trust remote firewall instrumentation
sn0int
Semi-automatic OSINT framework and package manager
unhook-bof
Remove API hooks from a Beacon process.
UnhookMe
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
weblogic_cmd_plus
weblogic full vulnerability exploit tool, support T3/XMLDecoder vulnerability scanning .
wsb-detect
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")