Lefteris Panos's repositories
AQUARMOURY
My musings in C and offensive tooling
cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
concealed_position
Bring your own print driver privilige escalation tool
CVE-2021-1675-LPE
Local Privilege Escalation Edition for CVE-2021-1675
dnstake
DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover
ElusiveMice
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
evasion
Windows packer
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
injectAmsiBypass
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
InlineExecute-Assembly
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module
LittleCorporal
LittleCorporal: A C# Automated Maldoc Generator
MappingInjection_CSharp
MappingInjection via csharp
Obfuscate
Guaranteed compile-time string literal obfuscation header-only library for C++14
RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
rootOS
macOS Privilege Escalation Helper
secinject
Section Mapping Process Injection (secinject): Cobalt Strike BOF
ServiceMove-BOF
New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.
SharpBeacon
CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
SharpImpersonation
A User Impersonation tool - via Token or Shellcode injection
SharpLink
Create file system symbolic links from low privileged user accounts within PowerShell
SharpStrike
A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
SigFlip
SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.
TrustedPath-UACBypass-BOF
Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object.
UserModeUnhooking
This project is created for research into antivirus evasion by unhooking.