-
University of Wisconsin
- Madison, Wisconsin
Stars
A curated list of awesome privilege escalation
Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64, RV64 and LoongArch Linux devices
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
A simple XLL, showing how to create an XLL from scratch.
Patches needed to build VMware (Player and Workstation) host modules against recent kernels
Cheat Engine. A development environment focused on modding
Repo for collecting part of my public CTF challenges
ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native executables.
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Kerberos relaying and unconstrained delegation abuse toolkit
Active Directory Integrated DNS dumping by any authenticated user
A helpful Java Deserialization exploit framework.
Tools for Kerberos PKINIT and relaying to AD CS
Python version of the C# tool for "Shadow Credentials" attacks
Username tools for penetration testing
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
A versatile and easy-to-use static binary patching tool.
Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability
An analysis of CVE-2025-55182 and CVE-2025-66478 -- the vulnerabilities behind React2Shell. Tools, technical information, etc