-
13:57
(UTC +07:00) - https://t.me/odanbroder
- https://odanbroder.github.io/
Lists (28)
Sort Name ascending (A-Z)
BH
BOFs
Cheat seet
Cobalt Strike
Crack
IDA
kernel
Malware - Bypass AV
Payload
Proxy
RAT
SurveillanceRed Team
Red Team - AV
Red Team - C2
Red team - Credential
Red Team - DNS
Red Team - Evasion
Red team - Initial Access
Red Team - Malware
Red Team - Obfuscation
Red Team - persistent
Red team - Phising
Red team - Rootkit
Red Team - Toolkit
Red Team - Tools
Server
shell
webshellwordlist
Stars
A Simple Go program for Windows that will recover Google Chrome Logins
Second Version of The GoBot Botnet, But more advanced.
A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk
Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames
Inject .NET assemblies into an existing process
Cobalt Strike BOF for evasive .NET assembly execution
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
A PowerShell console in C/C++ with all the security features disabled
坤坤CS 基于CobaltStrike cat 4.5二开项目 添加反沙箱、反测绘。集成常用后渗透插件,开箱即用
Cobalt Strike AggressorScripts For Red Team
Situational Awareness commands implemented using Beacon Object Files
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Stealthy Linux Kernel Rootkit for modern kernels (6x)
Take a list of domains and probe for working HTTP and HTTPS servers
Shellcode IDE — makes developing and analyzing shellcode much more convenient.
This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
Post-exploitation scripts for OS X persistence and privesc
APT & CyberCriminal Campaign Collection
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
A workshop about Malware Development