Stars
m00zh33 / QuasarRAT
Forked from quasar/QuasarRemote Administration Tool for Windows
m00zh33 / unicorn
Forked from trustedsec/unicornUnicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
m00zh33 / TinyMet
Forked from SherifEldeeb/TinyMetA "tiny" meterpreter stager
m00zh33 / rpivot
Forked from klsecservices/rpivotsocks4 reverse proxy for penetration testing
m00zh33 / impacket
Forked from fortra/impacketImpacket is a collection of Python classes for working with network protocols.
m00zh33 / CheckPlease
Forked from Arvanaghi/CheckPleaseSandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
m00zh33 / Empire
Forked from EmpireProject/EmpireEmpire is a PowerShell and Python post-exploitation agent.
m00zh33 / juicy-potato
Forked from ohpe/juicy-potatoA sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
APT Groups and Operations (https://apt.threattracking.com) in SQL
Cheat sheets for various commands and scripts
m00zh33 / PAExec
Forked from poweradminllc/PAExecRemote execution, like PsExec
m00zh33 / androrat
Forked from DesignativeDave/androratRemote Administration Tool for Android devices
ADEO APT10 Threat Analysis Report
PowerShell Obfuscator
m00zh33 / Tunna
Forked from SECFORCE/TunnaTunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
Advanced Persistent Bot, or APBot, is an AI chatbot that provides information on advanced persistent threat (APT) groups.
Unsupervised Analysis Framework for Heterogenous Log-Files (Patterns Extractor)
A curated malware database with more then +73000 samples.
An Advanced Persistent Threat Simulation Example under Loki Detection. Forked from
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
My scripts to deobfuscate APT32 malware
Personal compilation of APT malware from whitepaper releases, documents and own research
Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research