donut
Seatbelt
donut | Seatbelt | |
---|---|---|
4 | 8 | |
3,245 | 3,502 | |
- | 1.7% | |
0.0 | 6.1 | |
about 2 months ago | about 2 months ago | |
C | C# | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
donut
-
Bypassing Windows Defender (10 Ways)
The Donut project by TheWover is a very effective Position-Independent shellcode generator from PEs/DLLs. Depending on the input file given, it works different ways. For this PoC I will be using Mimikatz, so let us see how it works at a high level. From a brief look at the code, this would be the main routine of the Donut.exe executable tool:
-
Cannot Load .NET assemblies in memory!
Note that I used the loader from donut and it worked as expected! What am I doing wrong here people?
-
BEST KALI TOOL TO MAKE UNDETECTABLE BACKDOOR 2022?
Donut -- tool to convert (certain, very simple, non-.NET) PE files into shellcode.
- Does anyone know any good x64 shellcode loaders?
Seatbelt
-
Allowed tools for OSCP
I'm taking my OSCP exam next Wednesday and was just wondering on what tools are actually prohibited and which are not. I'm specifically referring to linpeas, winpeas, seatbelt. I often times run these tools when I've exausted my enumeration methods for a quick find. Are these tools allowed on the AD set and the individual machines?
-
Cannot Load .NET assemblies in memory!
However, whenever I tried to run Seatbelt or similar software, it keeps failing at Load_3() with the error code 0x8007000b.
-
What are the alternative tools for wmic on cmd?
I'd recommend poking around at github and see what you find. A good starting point is WinPEAS if you're looking for automation. Seatbelt might also be helpful
-
Hardening Best Practices: Materials for Windows 10/11
Seatbelt: https://github.com/GhostPack/Seatbelt
- I passed with 100 points on second attempt AMA
- AzureDevOps + Github Question
- GhostPack/Seatbelt - Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
What are some alternatives?
DripLoader - Evasive shellcode loader for bypassing event-based injection detection (PoC)
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Shhhloader - Syscall Shellcode Loader (Work in Progress)
OSCP-Priv-Esc - Mind maps / flow charts to help with privilege escalation on the OSCP.
vivanewvegas-wabbajack - A Wabbajack port of the Viva New Vegas modding guide.
Windows11_Hardening - a collection about Windows 11
pe_to_shellcode - Converts PE into a shellcode
Ryujinx - Experimental Nintendo Switch Emulator written in C#
ThreatCheck - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
PrivescCheck - Privilege Escalation Enumeration Script for Windows
obfuscator
exec-assembly - Execute .NET assemblies in Memory!