fka dibs's repositories
BITSServer
A Python3 HTTPServer wrapper for the Windows BITS protocol
dotfiles
configure vim, tmux, etc
sasquatch
Sasquatch is an installation script for provisioning secure HTTPS and DNS redirectors for offensive security testing, leveraging Caddy and CoreDNS
bpf-developer-tutorial
eBPF Developer Tutorial: Learning eBPF Step by Step with Examples
counterfit
a CLI that provides a generic automation layer for assessing the security of ML models
denim
Automated compiler obfuscation for nim
DotNetInjections
Loading Assemblies Into Processes, the All Natural Organic way
ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
FOLIAGE
Experiment on reproducing Obfuscate & Sleep
gdrv-loader
Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) to load a unsigned driver
Lastenzug
Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level
Microsoft-Terminal-One-Dark
A One Dark color scheme for Microsoft Terminal
moonriver
step/mod sequencer for orca
nimPNG
PNG (Portable Network Graphics) decoder and encoder written in Nim
NSudo
Series of System Administration Tools
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
Phant0m
Windows Event Log Killer
Reptile
LKM Linux rootkit
ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
SilentMoonwalk
PoC Implementation of a fully dynamic call stack spoofer
solarflare
SolarWinds Orion Account Audit / Password Dumping Utility
ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
umap
UEFI bootkit for driver manual mapping
Yumekage
Demo proof of concept for shadow regions, and implementation of HyperDeceit.