koushui's repositories
atexec-pro
Fileless atexec, no more need for port 445
Banshee
Experimental Windows x64 Kernel Rootkit.
Beacon_Source
not a reverse-engineered version of the Cobalt Strike Beacon
Chaos-Rootkit
Now You See Me, Now You Don't
deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
dll_to_exe
Converts a DLL into EXE
emp3r0r
Linux/Windows post-exploitation framework made by linux user
evilgophish
evilginx3 + gophish
exe_to_dll
Converts a EXE into DLL
GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
InflativeLoading
Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.
kdmapper
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
LetMeowIn
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
ligolo-mp
Multiplayer pivoting solution
lsa-whisperer
Tools for interacting with authentication packages using their individual message protocols
Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
nebula_p2p_vpn
A scalable overlay networking tool with a focus on performance, simplicity and security
Nidhogg
Nidhogg is an all-in-one simple to use rootkit.
Parasite-Invoke
Hide your P/Invoke signatures through other people's signed assemblies
pe_to_shellcode
Converts PE into a shellcode
perfect-dll-proxy
Perfect DLL Proxying using forwards with absolute paths.
persistence_demos
Demos of various (also non standard) persistence methods used by malware
Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
TheFatRat
Thefatrat a massive exploiting tool revealed >> An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
uncover
Quickly discover exposed hosts on the internet using multiple search engines.