Category: Exploitation

execute indirect syscalls

HWSyscalls: new method to execute indirect syscalls

HWSyscalls HWSyscalls is a new method to execute indirect syscalls using 3 main components: Hardware breakpoints and Vectored Exception Handler to control the flow of execution. HalosGate is used to find syscall numbers and...

binary obfuscator

Alcatraz: x64 binary obfuscator

Alcatraz Alcatraz is an x64 binary obfuscator that is able to obfuscate various different pe files including: .exe .dll .sys Features In the following showcase, all features (besides the one being showcased) are disabled....

DLL Hijacking Discovery Tool

Spartacus v2.2 releases: DLL Hijacking Discovery Tool

Spartacus DLL Hijacking Spartacus is utilising the SysInternals Process Monitor and is parsing raw PML log files. You can leave ProcMon running for hours and discover 2nd and 3rd level (ie an app that loads another...

CobaltStrike Beacon bypass anti-virus

geacon_pro: cross-platform CobaltStrike Beacon bypass anti-virus

geacon_pro geacon_pro is an Anti-Virus bypassing CobaltStrike Beacon written in Golang based on the geacon project. geacon_pro supports CobaltStrike version 4.1+ geacon_pro has implemented most functions of Beacon. The core of bypassing Anti-Virus can be...

invoke encrypted shellcode

BrokenFlow: invoke an encrypted shellcode

BrokenFlow A simple PoC to invoke an encrypted shellcode by using a hidden call. Introduction This code uses a simple trick to hide the instruction that effectively will jump to our shellcode. This should make...

bypassing EDRs

Freeze v1.3 releases: payload toolkit for bypassing EDRs

Freeze Freeze is a payload creation tool used for circumventing EDR security controls to execute shellcode in a stealthy manner. Freeze utilizes multiple techniques to not only remove Userland EDR hooks but to also...

NTLM Relaying Attacks

ADFSRelay: NTLM Relaying Attacks Targeting ADFS

ADFSRelay This repository includes two utilities NTLMParse and ADFSRelay. NTLMParse is a utility for decoding base64-encoded NTLM messages and printing information about the underlying properties and fields within the message. Examining these NTLM messages...