Stars
Detect and analyze the Zeus Banking Trojan using various tools and techniques, including malware simulation, network monitoring, memory analysis, and signature-based detection
Veil 3.1.X (Check version info in Veil at runtime)
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
this my repo with notes i take in penetration testing
A tool designed to extract and decrypt saved passwords from popular web browsers
Checklists for Testing Security environment
Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...
A C2 framework built for my bachelors thesis
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.
An open-source, free protector for .NET applications
SharpSploit is a .NET post-exploitation library written in C#
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
A web-based demonstration of blockchain concepts.