-
annai college
- India
Popular repositories Loading
-
window-persistence-Privilege-Escalation
window-persistence-Privilege-Escalation PublicA complete hands-on reference of 46 Windows persistence techniques used by real-world APT groups. Each technique includes MITRE ATT&CK TTP mapping, known threat actor attribution, attack commands, …
C 5
-
PE-FORMAT-AND-MALWARE-ANALYSIS
PE-FORMAT-AND-MALWARE-ANALYSIS PublicHands-on PE format internals lab — headers, sections, data directories, TLS, AoEP, packer detection & UPX unpacking, payload injection (.text/.rsrc/.data/XOR/Base64), and packed malware analysis us…
C++ 4
-
VBA-MALWARE-DEV-AND-ANALYSIS-TOOL
VBA-MALWARE-DEV-AND-ANALYSIS-TOOL PublicResources, scripts, and notes from hands-on VBA macro analysis, malware analysis (Office files), C2 simulation, and cybersecurity research. Covers static & dynamic techniques, formula injection, an…
-
hta-malware-and-js-ransomware
hta-malware-and-js-ransomware PublicA comprehensive guide to mshta.exe abuse. Explores its use as a Living Off the Land Binary (LOLBin), basic HTA structure, fileless execution techniques, and common attack vectors including Metasplo…
Python 3
-
frogman-tool
frogman-tool PublicWMI Frogman is a PowerShell-based Windows security audit tool with 600+ WMI/CIM commands covering system info, users, services, processes, network, AD recon, browser artifacts, CVE matching, and MI…
PowerShell 1
-
MY-CRYPTO-TOOLS-
MY-CRYPTO-TOOLS- PublicThis repo contains crypto tools I built myself for CTFs and learning. It includes my custom scripts for crypto-based attacks, decoding, and automation. A simple collection made in my own style that…
Python
If the problem persists, check the GitHub status page or contact support.