RunOnceEx

RunOnceEx

User data from Github https://github.com/RunOnceEx

Location:Deep forest

GitHub:@RunOnceEx

RunOnceEx's repositories

apache-rootkit

A malicious Apache module with rootkit functionality

Language:CStargazers:0Issues:1Issues:0

DBC2

DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means of communication.

Language:PowerShellStargazers:0Issues:0Issues:0

DNS-C2

DNS-Persist is a post-exploitation agent which uses DNS for command and control

Language:C++License:MITStargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0

EventCleaner

A tool mainly to erase specified records from Windows event logs, with additional functionalities.

Language:C++Stargazers:0Issues:0Issues:0

external_c2_framework

Python api for usage with cobalt strike's External C2 specification

Language:PythonStargazers:0Issues:0Issues:0

Hooking-via-InstrumentationCallback

codes for my blog post: https://secrary.com/Random/InstrumentationCallback/

Language:C++Stargazers:0Issues:0Issues:0
Language:C#License:GPL-3.0Stargazers:0Issues:0Issues:0

jdbc-backdoor

A fake JDBC driver that allows OS command execution.

Language:JavaLicense:MITStargazers:0Issues:0Issues:0

jellyfish

GPU rootkit PoC by Team Jellyfish

Language:CLicense:GPL-2.0Stargazers:0Issues:0Issues:0

MSSQL-Fileless-Rootkit-WarSQLKit

Bildiğiniz üzere uzun zamandır MSSQL üzerine çalışmalar yapmaktayım. Bu yazımda uzun zamandır uğraştığım bir konuyu ele alacağım, MSSQL Rootkit. Bildiğiniz üzere şimdiye kadar MS-SQL için anlatılan post-exploitation işlemlerinin büyük çoğunluğu “xp_cmdshell” ve “sp_OACreate” stored procedure’lerini kullanarak anlatılır. Peki xp_cmdshell ve sp_OACreate stored procedure’lerinin olmadığı bir MSSQL sunucusunun “sa” hesabını ele geçirmişsek, o sisteme girmekten vaz mı geçeceğiz? Tabii ki vazgeçmememiz gerekiyor. Bu makale “sa” hesabının yakalandığı ve “xp_cmdshell”, “sp_OACreate”, “sp_OAMethod” vb. prosedürlerin hiç birinin çalışmadığı bir senaryo düşünülerek kaleme alınmıştır.

Language:C#License:MITStargazers:0Issues:1Issues:0

MyHousekeeper

电脑管家,可以根据不同的病毒特征查杀

Language:C++Stargazers:0Issues:0Issues:0

NetworkSocket

NetworkSocket是一个以中间件(middleware)扩展通讯协议,以插件(plug)扩展服务器功能的支持SSL安全传输的通讯框架;目前支持http、websocket、fast、flex策略与silverlight策略协议。

Language:C#Stargazers:0Issues:0Issues:0

nt4

Windows NT4 source code

Stargazers:0Issues:0Issues:0

OSCE

Collection of things made during my preparation to take on OSCE

Language:PythonStargazers:0Issues:0Issues:0

OSCE-1

Some exploits, which I’ve created during my OSCE preparation.

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

PESecurity

PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.

Language:PowerShellLicense:MITStargazers:0Issues:0Issues:0

r.net

Use .Net assemblies from R environment

Language:C#Stargazers:0Issues:1Issues:0

redsnarf

RedSnarf is a pen-testing / red-teaming tool for Windows environments

Language:PowerShellLicense:Apache-2.0Stargazers:0Issues:0Issues:0
Language:C++License:MITStargazers:0Issues:0Issues:0

SharpWeb

.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.

Language:C#Stargazers:0Issues:0Issues:0

shellcode-example

Windows shellcode example

Language:CLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

sniffMK

sniff mouse and keyboard events

Language:Objective-CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

SuperVirus

Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous mutations, code imitation and DNA programming to enable/disable functionalities

Language:C++Stargazers:0Issues:0Issues:0

UncoverDCShadow

A PowerShell utility to dynamically uncover a DCShadow attack

Language:PowerShellLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Veracrypt-Password-Extractor

A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.

Language:CLicense:MITStargazers:0Issues:0Issues:0

WinPIT

Windows Process Injection Toolkit - plain and simple :)

Language:C#Stargazers:0Issues:0Issues:0