ingramali's repositories
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PySilon-malware
Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier.
KryptonC2
Krypton C2 is a simple botnet source. Credits Source Code: NixWasHere
Smart-Email-Extractor
This program is a command-line software used to speedily extract email addresses and attachments from files or folders, email accounts (through IMAP, POP3, MBOX, MailDir, or EML), WHOIS records, websites, and search engines. It is distributed as freeware
DefenseEvasionTechniques
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
dystopia-c2
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Ultimate-RAT-Collection
For educational purposes only, samples of old & new malware builders including screenshots!
RWX_MEMEORY_HUNT_AND_INJECTION_DV
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
MalwareAnalysis
Welcome to the Malware Analysis Toolkit repository, your comprehensive resource for dissecting and understanding the intricate world of malware. This repository is dedicated to providing in-depth technical analysis of various malware strains, equipping security professionals, researchers, and enthusiasts with the knowledge
C2_Elevated_Shell_DLL_Hijcking
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
on-disk-detection-bypass
Direct syscalls Injection to bypass AV/EDR
Persistence_AND_Anti_Sandbox
This repository contains the c# code which is using latest persistence technique and multiple anti-vm, anti-sandboxes techniques. Creating persistence by using WindowsApps folder, schtasks, powershell cmdlet (Get-Variable).
hoaxshell
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
DV_NEW
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
PPPwn
PPPwn - PlayStation 4 PPPoE RCE
devika
Devika is an Agentic AI Software Engineer that can understand high-level human instructions, break them down into steps, research relevant information, and write code to achieve the given objective. Devika aims to be a competitive open-source alternative to Devin by Cognition AI.
Clone-Wars
100+ open-source clones of popular sites like Airbnb, Amazon, Instagram, Netflix, Tiktok, Spotify, Whatsapp, Youtube etc. See source code, demo links, tech stack, github stars.
CVE-llm_dataset
This is a dataset intended to train a LLM model for a completely CVE focused input and output.
D3MPSEC
"D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system calls, randomized procedures, and prototype name obfuscation. Its primary purpose is to bypass both static and dynamic analysis techniques commonly employed by security measures.
poastal
Poastal - the Email OSINT tool
GPT_Vuln-analyzer
Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerability reports based on Nmap scan data, and DNS scan information. It can also perform subdomain enumeration to a great extent
DogeRat
A multifunctional Telegram based Android RAT without port forwarding.
ipv6-proxy-server
IPv6 backconnect proxy server /64 and /48 subnet for any debian-based distro
WinFiHack
A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.
kizagan
KIZAGAN is a RAT,c2 command&control tool.It allows you to build executables and control infected machines.
evilginx2-TTPs
Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.
remote_terminal
TCP Server for managing remote systems
BackDoorSim
BackdoorSim: An Educational into Remote Administration Tools