-
Malwarebytes / ThreatDown
- San Francisco, CA
- cylect.io
Stars
A curated list of Anki Cozmo resources.Feel free to contribute!
Notes some analysis related to VidarStealer sample
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
A light-weight first-stage C2 implant written in Nim.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Azure Security Resources and Notes
A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:
Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.
A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.
Fully-featured Doom port for the Raspberry Pi RP2040 microcontroller
A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
Nim-based assembly packer and shellcode loader for opsec & profit
C or BOF file to extract WebKit master key to decrypt user cookie
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
A scalable overlay networking tool with a focus on performance, simplicity and security
A Collection of Over 60 Scripts - updated specifically for the BadUSB function on the FlipperZero.