-
Monash University
- Clayton
- https://jm33.me
- @jm33_m0
- @jm33@infosec.exchange
- in/jm33m0
Highlights
- Pro
- All languages
- ASP
- Assembly
- AutoHotkey
- Batchfile
- C
- C#
- C++
- CSS
- Classic ASP
- Clojure
- CoffeeScript
- Dockerfile
- Emacs Lisp
- Erlang
- FreeMarker
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Logos
- Lua
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Roff
- Ruby
- Rust
- Scala
- Shell
- Smali
- Swift
- TeX
- TypeScript
- V
- VBA
- VBScript
- Vala
- Verilog
- Vim Script
- Vim Snippet
- Visual Basic .NET
- Vue
- YARA
- Zig
Starred repositories
Script to remove Windows 10 bloatware.
PowerSploit - A PowerShell Post-Exploitation Framework
Office Tool Plus localization projects.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Empire is a PowerShell and Python post-exploitation agent.
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Automation for internal Windows Penetrationtest / AD-Security
Privilege Escalation Enumeration Script for Windows
if you are Thanos(root), this command could delete half your files randomly
Scripts to simplify setting up a Windows developer box
NetRipper - Smart traffic sniffing for penetration testers
A PowerShell wrapper around the fuzzy finder fzf
Cmd.exe Command Obfuscation Generator & Detection Test Harness
This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.
Windows batch script that finds misconfiguration issues which can lead to privilege escalation.
Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware
A Powershell client for dnscat2, an encrypted DNS command and control tool.
Learn from Casey Smith @subTee
CVE-2020-1337 Windows Print Spooler Privilege Escalation
Rapidly initialize Windows Sandbox for malware analysis and reverse engineering
powershell codes of my blog.
LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network
Powershell to CodeExecution and ProcessInjection
Use Waitfor.exe to maintain persistence
Enable natural scrolling feature for a USB mouse under Windows 10/11