Skip to content
View DamonMohammadbagher's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report DamonMohammadbagher

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Tools and Techniques for Red Team / Penetration Testing

6,218 853 Updated Aug 8, 2023

Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide

C++ 3,550 441 Updated Jun 4, 2024

Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...

C 154 27 Updated Sep 12, 2024

A simple to use single-include Windows API resolver

C++ 19 3 Updated Jul 9, 2024

Generic PE loader for fast prototyping evasion techniques

C 190 43 Updated Jul 2, 2024

Slides & Code snippets for a workshop held @ x33fcon 2024

C 250 44 Updated Jun 15, 2024

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…

C++ 503 84 Updated Jun 12, 2024

Another implementation of disabling the Antimalware Scan Interface (AMSI) by patching the AmsiScanBuffer function in amsi.dll

Python 3 Updated Jun 1, 2024

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 330 39 Updated Jun 3, 2024

Research into removing strings & API call references at compile-time (Anti-Analysis)

C++ 24 4 Updated Jun 2, 2024

“Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract possibly injected code from the processes on a LIVE windows sy…

15 1 Updated Sep 21, 2022

Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows

14 1 Updated Jan 12, 2025

Encrypting and Decrypting Image using PIL library by swapping pixels values.

Python 1 Updated May 3, 2024

Simple Powershell Http shell With WEB UI

PHP 70 8 Updated Nov 22, 2024

NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals …

C++ 149 24 Updated May 7, 2024

A (quite) simple steganography algorithm to hide shellcodes within bitmap image.

C 21 4 Updated May 4, 2024

IAT Unhooking proof-of-concept

Assembly 29 4 Updated Apr 7, 2024

Sample Rust Hooking Engine

Rust 35 4 Updated Apr 5, 2024

.NET/PowerShell/VBA Offensive Security Obfuscator

C# 108 16 Updated May 4, 2024
Assembly 26 4 Updated Oct 16, 2024

AV bypass while you sip your Chai!

C 212 31 Updated May 17, 2024

Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)

C++ 140 17 Updated Mar 16, 2024

Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

C 614 81 Updated Oct 15, 2024

A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.

C# 650 117 Updated May 15, 2024

a PoC for combining PPID spoofing with process hollowing shellcode injection

Rust 11 Updated Feb 15, 2024

Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution

C++ 169 33 Updated Mar 19, 2024
Next