yougar0x00's repositories
XLL_Phishing
XLL Phishing Tradecraft
RedTeamNotes
红队笔记
go-icmpshell
一款基于 gopacket 编写的 ICMP 反弹 shell 工具
OSED
Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)
EventViewerUAC_BOF
Beacon Object File implementation of Event Viewer deserialization UAC bypass
C2-Tool-Collection
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
Mutants_Sessions_Self-Deletion
Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.
RedTeamCCode
Red Team C code repo
gjango
golang gin with go-pg orm
pocassist
全新的开源漏洞测试框架,实现poc在线编辑、运行、批量测试。使用文档:
Awesome-RedTeam-Cheatsheet
Active Directory & Red-Team Cheat-Sheet in constant expansion.
e9patch
A powerful static binary rewriting tool
Smap
a drop-in replacement for Nmap powered by shodan.io
RedDrop
RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.
nim-loader
WIP shellcode loader in nim with EDR evasion techniques
AV_Evasion_Tool
掩日 - 免杀执行器生成工具
Note
笔记
cobaltstrike-beacon-data
Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
java-all-call-graph
Generate all call graph for Java Code.
opscloud4
企业级通用运维管理平台(IaC)
DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Mochi
Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.
BokuLoader
Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities. By: @0xBoku & @s4ntiago_p
tetanus
Mythic C2 agent targeting Linux and Windows hosts written in Rust
CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files