Skip to content
View C0nd4's full-sized avatar

Block or report C0nd4

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
14 stars written in C
Clear filter

A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…

C 11,227 1,420 Updated Jan 3, 2025

Small and highly portable detection tests based on MITRE's ATT&CK.

C 10,020 2,840 Updated Jan 1, 2025

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,262 535 Updated Jan 1, 2025

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,515 537 Updated Jan 2, 2025

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,226 314 Updated Sep 22, 2024

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 1,876 289 Updated Aug 15, 2024

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

C 1,751 314 Updated Jan 5, 2024

LSASS memory dumper using direct system calls and API unhooking.

C 1,496 244 Updated Jan 5, 2021

A tool to kill antimalware protected processes

C 1,402 241 Updated Jun 19, 2021

A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC

C 351 56 Updated May 24, 2022

Evading WinDefender ATP credential-theft

C 254 48 Updated Dec 2, 2019

PoC to demonstrate how CLR ETW events can be tampered.

C 184 33 Updated Mar 26, 2020