#Offensive_security
1. Staging Cobalt Strike with mTLS using Caddy
https://improsec.com/tech-blog/staging-cobalt-strike-with-mtls-using-caddy
]-> Repo: https://github.com/improsec/caddystager
2. Golang Bypass Av Generator template
https://github.com/Arks7/Go_Bypass
1. On the malicious use of large language models like GPT-3
https://research.nccgroup.com/2021/12/31/on-the-malicious-use-of-large-language-models-like-gpt-3
2. Inject .NET assemblies into an existing process
https://github.com/kyleavery/inject-assembly
Bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
https://github.com/epi052/osed-scripts
1. Windows Process Injection in C# via Kernel Callbacks
https://gist.github.com/sbasu7241/5dd8c278762c6305b4b2009d44d60c13
2. Source codes of Windows API Exploitation for Red and Blue teams
https://github.com/tbhaxor/WinAPI-RedBlue
1. Updated DInjector with the "CurrentThreadUuid" technique: shellcode in a list of UUID strings HeapCreate & UuidFromStringA to convert and copy the SC EnumSystemLocalesA to trigger the callback
https://github.com/snovvcrash/DInjector/blob/main/DInjector/Modules/CurrentThreadUuid.cs?s=09
2. ADExplorerSnapshot is an AD Explorer snapshot ingestor for BloodHound
https://github.com/c3c/ADExplorerSnapshot.py
1. AutoSUID is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges
https://github.com/IvanGlinkin/AutoSUID
2. Nzyme - WiFi Defense System
https://github.com/lennartkoopmann/nzyme
]-> https://www.nzyme.org
*Beware click the link!