Aahron Chetrit's repositories
GuardBypassToolkit
A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run Mimikatz in-memory. The project includes an LSASS dumper that uses a callback function and memory manipulations to bypass Windows Defender
Efficient-Vulnerability-Scanning-and-Payload-Generation
A tool that automates vulnerability scanning and payload generation using Procmon and advanced techniques. It generates reports and payloads in C++ and can be run with options to customize the scan duration, apply filters, and specify the output path. It requires a GCC compiler to run in addition to Procmon.
Local-Windows-Privilege-escalation
Demonstrating privilege escalation in Windows, enabling a normal user to gain SYSTEM NT AUTHORITY privileges through a combination of techniques.
Reverse-Shell-managed-through-virustotal-api
Reverse Shell managed through virustotal api, to start the shell upload random file to virus total website copy the file hash into the "hashSource" variable on the top of the code, also copy your virus total api to "ApiVt" variable, do the same on both client and server.
ahron-chet
Config files for my GitHub profile.
My-encryption-Algorithm-in-powershell
My symmetric encryption algorithm implemented in pure powershell
PyCryptoLib
Asymmetric encryption Python library, providing a complete implementation of RSA, Elgamal, and Diffie-Hellman, along with other mathematical algorithms in the context of cryptography
EAT-Hooking
This project focuses on manipulating the Export Address Table (EAT) to achieve function hooking in Windows binaries.
ArgsSpoofer
A tool that manipulate the peb to achieve command line args spoofing
PureLoader
EDR anti-hooking using custom implementaions of LoadLibrary and GetProcAddress.