Lists (3)
Sort Name ascending (A-Z)
Stars
A hex editor for WeChat/QQ/TIM - PC版微信/QQ/TIM防撤回补丁(我已经看到了,撤回也没用了)
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
CloudMoe Windows 10/11 Activation Toolkit get digital license, the best open source Win 10/11 activator in GitHub. GitHub 上最棒的开源 Win10/Win11 数字权利(数字许可证)激活工具!
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
PoCs and tools for investigation of Windows process execution techniques
Kernel mode WinDbg extension and PoCs for token privilege investigation.
StandIn is a small .NET35/45 AD post-exploitation toolkit
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the ori…
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
Escalate Service Account To LocalSystem via Kerberos
Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8
Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming