Category: Exploitation

KingHamlet: Process Ghosting Tool

KingHamlet Process Ghosting Tool – 64 bits Only! King Hamlet is a simple tool, which allows you to perform a Process Ghosting Attack. (https://www.elastic.co/blog/process-ghosting-a-new-executable-image-tampering-attack) Initially, you have to encrypt a...

cross-platform C2

Medusa: cross-platform C2 agent

Medusa Medusa is a cross-platform C2 agent compatible with both Python 3.8 and Python 2.7. Notable Features Dynamic loading/unloading of agent functions to limit exposure of agent capabilities on-disk. Loading...

Process Hollowing Nim

NimHollow: Nim implementation of Process Hollowing

NimHollow Playing around with the Process Hollowing technique using Nim. Features: Direct syscalls for triggering Windows Native API functions with NimlineWhispers. Shellcode encryption/decryption with AES in CTR mode. Simple sandbox detection methods from the...

DLL Hijacking vulnerabilities

aDLL: Adventure of Dynamic Lynk Library

aDLL – Adventure of Dynamic Lynk Library aDLL is a binary analysis tool focused on the automatic discovery of DLL Hijacking vulnerabilities. The tool analyzes the image of the binary...

Encrypted PE Loader

Huan: Encrypted PE Loader Generator

Huan Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It encrypts the PE file to be run with different...