an0x03e8's starred repositories
comprehensive-rust
This is the Rust course used by the Android team at Google. It provides you the material to quickly teach Rust.
min-sized-rust
🦀 How to minimize Rust binary size 📦
collisions
Hash collisions and exploitations
RunPE-In-Memory
Run a Exe File (PE Module) in memory (like an Application Loader)
windows-api-function-cheatsheets
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
Inline-Execute-PE
Execute unmanaged Windows executables in CobaltStrike Beacons
Red-team-Interview-Questions
Red team Interview Questions
CallStack-Spoofer
This tool will allow you to spoof the return addresses of your functions as well as system functions.
ThreadlessInject-BOF
BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023.
WSuspicious
WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
PatchlessCLRLoader
.NET assembly loader with patchless AMSI and ETW bypass
ASRepCatcher
Make everyone in your VLAN ASRep roastable
ModuleStomping
https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/
koppeling-p
Adaptive DLL hijacking / dynamic export forwarding - EAT preserve
bypassing-av-detection
Bypassing antivirus detection: old-school malware, new tricks
bof-registry
Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry
malicious-service
Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions