Soumyani1's repositories

DarkWidow

Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing

Language:CLicense:MITStargazers:716Issues:16Issues:1

Learning-EDR-and-EDR_Evasion

I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.

Language:C++License:MITStargazers:272Issues:9Issues:0

reveng_rtkit

Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.

AMSI-patches-learned-till-now

I have documented all of the AMSI patches that I learned till now

Language:C++License:MITStargazers:71Issues:5Issues:0

Executable_Files

Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for further usage of C2 as well

Language:PowerShellStargazers:11Issues:3Issues:0

ETW_patches_from_userMode_learned_till_now

ETW patches from userMode learned till now

Language:C++License:MITStargazers:10Issues:4Issues:0

AQUARMOURY

My musings in C and offensive tooling

Language:CStargazers:7Issues:2Issues:0

VulnCon-WorkShop-Slides

VulnCon WorkShop - Maldev Workshop : Offensive TradeCraft - Syscalls to Stack Spoofing

BEAR

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine.

Language:C++Stargazers:2Issues:0Issues:0

Jomungand-HWBP-MemScanEvade

Shellcode Loader with memory evasion

Language:C++Stargazers:2Issues:1Issues:0

RemoveFalsePositives

Just a small python script which spits out unsigned char representation for Hooked Underlying Ntapis (Which are False Positives) , for c/cpp Usage

Language:PythonLicense:MITStargazers:2Issues:2Issues:0

.NetConfigLoader-MA

.net config loader

CPTS-cheatsheet

HackTheBox Certified Penetration Tester Specialist Cheatsheet

Stargazers:1Issues:0Issues:0

HeapCrypt

Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap

Language:C++Stargazers:1Issues:1Issues:0

KrakenMask

Sleep obfuscation

Language:C++Stargazers:1Issues:1Issues:0
License:GPL-3.0Stargazers:1Issues:2Issues:0

Windows-Internals

Important notes and topics on my journey towards mastering Windows Internals

Language:C++Stargazers:1Issues:1Issues:0

BlockOpenHandle

Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote memory scanners

Language:C++Stargazers:0Issues:1Issues:0
Language:HTMLLicense:MITStargazers:0Issues:2Issues:0

bloodyAD

BloodyAD is an Active Directory Privilege Escalation Framework

License:MITStargazers:0Issues:0Issues:0

Certipy-merged-with-esc15

Tool for Active Directory Certificate Services enumeration and abuse

License:MITStargazers:0Issues:0Issues:0

Cronos-MemoryScanEvasion

PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.

Language:CLicense:GPL-3.0Stargazers:0Issues:1Issues:0

DetectCobaltStomp

Detects Module Stomping as implemented by Cobalt Strike

Language:CLicense:GPL-2.0Stargazers:0Issues:1Issues:0

dploot-PostExp.py

DPAPI looting remotely in Python

Language:PythonLicense:MITStargazers:0Issues:1Issues:0
Stargazers:0Issues:0Issues:0

NET-Tools-For-CI-CD-pipelining

NET Tools for CI CD pipelining usecase!

License:MITStargazers:0Issues:1Issues:0
Language:RustStargazers:0Issues:1Issues:0

StackCrypt

Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume threads

Language:C++Stargazers:0Issues:1Issues:0