matt-culbert

matt-culbert

Geek Repo

Github PK Tool:Github PK Tool

matt-culbert's repositories

Language:GoLicense:GPL-2.0Stargazers:13Issues:1Issues:0
Language:GoLicense:Apache-2.0Stargazers:3Issues:0Issues:0
Language:HTMLLicense:MITStargazers:1Issues:0Issues:0

bhg

Code samples for No Starch Press Black Hat Go

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

cobalt-arsenal

My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

License:MITStargazers:0Issues:0Issues:0
Language:PythonLicense:MITStargazers:0Issues:0Issues:0

EDRSilencer

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

License:MITStargazers:0Issues:0Issues:0

Empire

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

evil-compiler

An evil compiler that adds undetectable backdoors into programs it compiles

License:MITStargazers:0Issues:0Issues:0

exploitation-course

Offensive Software Exploitation Course

Stargazers:0Issues:0Issues:0

follina.py

Quick POC to replicate the 'Follina' Office RCE vulnerability for local testing purposes

Stargazers:0Issues:0Issues:0

go-shellcode

A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.

License:GPL-3.0Stargazers:0Issues:0Issues:0
Language:GoLicense:MITStargazers:0Issues:0Issues:0

koadic

zerosum0x0's Koadic

License:Apache-2.0Stargazers:0Issues:0Issues:0

laZzzy

laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.

Language:C++License:MITStargazers:0Issues:0Issues:0

memguard

Secure software enclave for storage of sensitive information in memory.

License:Apache-2.0Stargazers:0Issues:0Issues:0

OffensiveNim

My experiments in weaponizing Nim (https://nim-lang.org/)

License:BSD-2-ClauseStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

OSCP-Cheatsheet

OSCP Cheatsheet by Sai Sathvik

Stargazers:0Issues:0Issues:0

PayloadsAllTheThings

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

License:MITStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

ShellGhost

A memory-based evasion technique which makes shellcode invisible from process start to end.

License:GPL-3.0Stargazers:0Issues:0Issues:0

suricata_rules

Rules for Suricata

Language:ShellStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

ThreadStackSpoofer

Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

License:MITStargazers:0Issues:0Issues:0

trevorc2

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

License:NOASSERTIONStargazers:0Issues:0Issues:0

w32

A wrapper of Windows APIs for Go

Language:GoLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Windows-universal-samples

API samples for the Universal Windows Platform.

License:MITStargazers:0Issues:0Issues:0

wintoken

Mainpulate, Steal and Modify Windows Tokens in Go

License:MITStargazers:0Issues:0Issues:0

WMIProcessWatcher

A CIA tradecraft technique to asynchronously detect when a process is created using WMI.

Language:C++Stargazers:0Issues:0Issues:0