fka dibs's repositories
cve-2024-6387-poc
a signal handler race condition in OpenSSH's server (sshd)
dbux
D-Bus bindings for the Elixir language
ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
bpf-developer-tutorial
eBPF Developer Tutorial: Learning eBPF Step by Step with Examples
Phant0m
Windows Event Log Killer
Yumekage
Demo proof of concept for shadow regions, and implementation of HyperDeceit.
PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
dotfiles
configure vim, tmux, etc
SilentMoonwalk
PoC Implementation of a fully dynamic call stack spoofer
Lastenzug
Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level
NSudo
Series of System Administration Tools
DotNetInjections
Loading Assemblies Into Processes, the All Natural Organic way
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
gdrv-loader
Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) to load a unsigned driver
counterfit
a CLI that provides a generic automation layer for assessing the security of ML models
BITSServer
A Python3 HTTPServer wrapper for the Windows BITS protocol
umap
UEFI bootkit for driver manual mapping
nimPNG
PNG (Portable Network Graphics) decoder and encoder written in Nim
FOLIAGE
Experiment on reproducing Obfuscate & Sleep
solarflare
SolarWinds Orion Account Audit / Password Dumping Utility
Reptile
LKM Linux rootkit
denim
Automated compiler obfuscation for nim
moonriver
step/mod sequencer for orca