-
koneko Public
Robust Cobalt Strike shellcode loader with multiple advanced evasion features
-
fakeprinter Public
Bunch of Python scripts made to host fake printer-like services
-
LetMeowIn Public
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
-
etwunhook Public
Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.
-
catdumper Public
LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.
-
TrellixHAX-WeNeedToBreakFree Public
Performed RCE by exploiting unsanitized inputs to gain a reverse shell and obtain the flag.
-
OSCPprep-Djinn1 Public
Created a Python script to cheat a game, used obfuscated command injection to achieve a reverse shell, and manipulated user-created binaries to perform multiple privilege escalations.
-
OSCPprep-BlueSky Public
Performed RCE against a vulnerable Apache Struts2 application and retrieved credentials from Mozilla Firefox password storage to perform privilege escalation.
-
OSCPprep-Durian Public
Performed RCE through LFI and log poisoning against vulnerable web servers and performed privilege escalation by manipulating process UIDs of binaries with SETUID capabilities.
-
OSCPprep-WallabysNightmare Public
Used multiple obfuscated command injections to open reverse shells and perform privilege escalations through exploiting vulnerable Sudo privileges and hijacking Tmux sessions.
-
OSCPprep-Katana Public
Compromised a web server using default credentials and abused binary capabilities to do privilege escalation.
-
OSCPprep-MrRobot1 Public
Enumerated and infiltrated a WordPress site and performed privilege escalation using Kali Linux.
-
OSCPprep-Cute Public
Exploited a File Upload flaw and the “Sudo Baron Samedit” vulnerability to hijack a web server.
-
OSCPprep-Sar Public
Performed a command injection attack and privilege escalation through a vulnerable web application.
-
OSCPprep-hackme1 Public
Harvested credentials using SQLmap and uploaded a PHP reverse shell script to hijack a web server.
-
OSCPprep-SickOs1.2 Public
Performed an RCE through a vulnerable HTTP page and used Metasploit to execute a privilege escalation.
-
OSCPprep-SickOs1.1 Public
Performed an RCE by exploiting the "Shellshock" vulnerability and hijacked a webserver.
-
OSCPprep-Napping Public
Performed a Tab Nabbing attack and privilege escalation to hijack a web server using Kali Linux.
-
Created a honeynet for malware analysis using MHN-Admin and Dionaea.
-
Live-PenTesting-Project Public
Exploited vulnerabilities in various web applications.
-
Network-Forensics-Project Public
Used Wireshark and Burp Suite to break into a "Members Only" website.
-
2022TTP-Application-Project Public
Forked from JjayTTP/2022TTP-Application-ProjectStudents will be submitting this project as a qualifier for the 2022 cohort for the Tech Talent Pipeline.
-
cathook Public
Forked from FeynmanTech/cathookTraining Software for the game Team Fortress 2
-
-
-
LineSolver Public
Simple line solver that takes two coordinates and returns its factors, distance, midpoint, and slope.
-
wordlist Public
Forked from jeanphorn/wordlistCollection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passwords.