Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
翻译 - 对抗性鲁棒性工具箱(ART)-用于机器学习安全性的Python库-规避,中毒,提取,推理
Veil 3.1.X (Check version info in Veil at runtime)
翻译 - Veil 3.1.X(在运行时检查Veil中的版本信息)
Identifies the bytes that Microsoft Defender flags on.
翻译 - 标识Microsoft Defender标记的字节。
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
翻译 - 规避技术以挫败和转移安全产品的检测和预防 (AV/EDR/XDR)
Enumerate and disable common sources of telemetry used by AV/EDR.
翻译 - 枚举和禁用AV / EDR使用的常见遥测源。
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
#安全# Real fucking shellcode encryptor & obfuscator tool
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
#安全# PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Take a screenshot without injection for Cobalt Strike