SkyBulk's Projects
APT
We are Diablos :D
整理的2019年厂商发布的漏洞预警公开POC集合,不足之处还希望多多补充,完善
403/401 Bypass Methods + Bash Automation + Your Support ;)
COMS 4182 Project I - building a fuzzer!
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Abdullah Agency is a sleek and engaging multi-page agency website template, skillfully crafted using Next.js, Tailwind CSS, and Framer Motion by the talented Tailwind CSS team. With its minimalist aesthetic and captivating animations, it's perfect for modern agencies.
用于渗透测试和红队基础设施建设的 payload 和 bypass 字典。A list of payload and bypass lists for penetration and red team infrastructure build.
Traversy Media, Responsive & Mobile First Website
Searches For Threat Hunting and Security Analytics
Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM
Focused on adversary intelligence, but not limited to
Adversary Simulation and Security Instrumentation
Adversary Emulation Planner
机器学习检测webshell
Building the AIRBNB Clone app with REACT JS!
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
[CVPR2020] Adversarial Latent Autoencoders
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
Alternative Shellcode Execution Via Callbacks
This repo contains some Amsi Bypass methods i found on different Blog Posts.
AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.
android kernel exploits漏洞集合 https://www.sec-wiki.com
Windows对抗沙箱和虚拟机的方法总结
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
[POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)