SkyBulk's repositories

ViperVenom

ViperVenom - Listener & Spyware Tool Developed and Maintained By Revise7

Language:PythonLicense:EPL-2.0Stargazers:9Issues:1Issues:0

Huan-loader

Encrypted PE Loader Generator

Language:CStargazers:3Issues:1Issues:0

OSEP-Tooling

Tooling I utilized within the PEN300 training labs

Stargazers:1Issues:0Issues:0
Stargazers:0Issues:0Issues:0

4-ZERO-3

403/401 Bypass Methods + Bash Automation + Your Support ;)

Language:ShellLicense:MITStargazers:0Issues:1Issues:0

Anti-Virus-Evading-Payloads

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!

Stargazers:0Issues:0Issues:0

BeaconEye

Hunts out CobaltStrike beacons and logs operator command output

Language:C#Stargazers:0Issues:1Issues:0

byob

An open-source post-exploitation framework for students, researchers and developers.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:1Issues:0

bypassAV-1

借助Win-PS2EXE项目编写cna脚本方便快速生成免杀可执行文件

Language:PowerShellStargazers:0Issues:1Issues:0

C2_Server_Encrypted_-_Advance

Python C2 server advance and encrypted but in development Phase

Stargazers:0Issues:0Issues:0

Detection-Ideas-Rules

Detection Ideas & Rules repository.

Stargazers:0Issues:0Issues:0

DFIR_Resources_REvil_Kaseya

Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack

License:NOASSERTIONStargazers:0Issues:0Issues:0

DOD_STD_DRIVE_ERASE

Repository for my in-progress DOD standard drive erasure software in the Windows API for x86 and x86_64 with VS2010 and VS2019

Stargazers:0Issues:0Issues:0

DongTai-agent-java

“火线~洞态IAST”是一款专为甲方安全人员、代码审计工程师和0 Day漏洞挖掘人员量身打造的辅助工具,可用于集成devops环境进行漏洞检测、作为代码审计的辅助工具和自动化挖掘0 Day。

License:GPL-3.0Stargazers:0Issues:0Issues:0

hashview

A web front-end for password cracking and analytics

Language:CSSLicense:GPL-3.0Stargazers:0Issues:1Issues:0

HexraysToolbox

Hexrays Toolbox - Find code patterns within the Hexrays AST

License:CC0-1.0Stargazers:0Issues:0Issues:0

managers-playbook

:book: Heuristics for effective management

License:CC-BY-4.0Stargazers:0Issues:0Issues:0

MsfMania

Python AV Evasion Tools

License:GPL-3.0Stargazers:0Issues:0Issues:0

osed-automation

automation for osed course

Stargazers:0Issues:0Issues:0

PageTableInjection

Code Injection, Inject malicious payload via pagetables pml4.

License:MITStargazers:0Issues:0Issues:0
License:GPL-3.0Stargazers:0Issues:0Issues:0

pharos

Automated static analysis tools for binary programs

Language:C++License:NOASSERTIONStargazers:0Issues:1Issues:0

PickleC2

PickleC2 is a post-exploitation and lateral movements framework

Stargazers:0Issues:0Issues:0

PickleC2-Documentation

This repo for PickleC2 Documentation

Stargazers:0Issues:0Issues:0

playbooks

Phantom Community Playbooks

Language:PythonStargazers:0Issues:1Issues:0

post-attack

后渗透:免杀、代理、横向

Stargazers:0Issues:0Issues:0

shellcode_inject

inject and run code into arbitrary process (only x86)

Stargazers:0Issues:0Issues:0

tmc

Threat Mapping Catalogue

Language:PythonStargazers:0Issues:0Issues:0

YoutubeAsAC2

Poc of using youtube comments for C2 communications

Stargazers:0Issues:0Issues:0

zuthaka

Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools.

Language:PythonLicense:NOASSERTIONStargazers:0Issues:1Issues:0