-
Pen Tester
- /home/australia
- https://twitter.com/s1nfulz
Stars
Luanti (formerly Minetest) is an open source voxel game-creation platform with easy modding and game creation
Diablo build for modern operating systems
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
The successor to Hyperion aka Hyperion Next Generation
An even funnier way to disable windows defender. (through WSC api)
Collection of various malicious functionality to aid in malware development
WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.
Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
Another Windows Local Privilege Escalation from Service Account to System
Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.
Evasive shellcode loader for bypassing event-based injection detection (PoC)
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.
Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.ex…