C. Tan's repositories
EXOCET-AV-Evasion
EXOCET - AV-evading, undetectable, payload delivery tool
GladiatorCLI
Command Line Interface/Framework for Black Hat CTF Competitors
Exploit-Development-Tools
A bunch of my exploit development helper tools, collected in one place.
analyst-punish
Proof of concept analyst punishing for red teaming payloads
ProtectMyTooling
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
cppcrashcourse
What I felt was important in the book for C++17 and boost libraries.
ElusiveMice
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
expdevBadChars
Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
hotelbookings
Part 2 of my Golang-based web app class
PackMyPayload
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
redteamctf
Reversing Challenges
thmredteampayloads
Just coding exercises that I did in C, C++, and C# to complete the THM Red Team Path.
btc_diagnostic_payload
LULLC Contract 011518. Do NOT EXECUTE. Was meant for bash bunny
camodernapproach
What I thought was relevant in KN King's book
removeoldkernels
Something I found online that conveniently removes old kernels but leaves your currently running one alone.
ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
VisualBasicObfuscator
Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.