-
RedOps GmbH
- https://redops.at/en/knowledge-base
- @VirtualAllocEx
Highlights
- Pro
Stars
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
Windows Local Privilege Escalation Cookbook
Payload Generation Framework
An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer
A little tool to play with Windows security
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …
DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable
PoC Implementation of a fully dynamic call stack spoofer
C++ self-Injecting dropper based on various EDR evasion techniques.
Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms
Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines
HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Intro to x86 Assembly Language.
Powershell script to do domain auditing automation
Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.