Stars
The recursive internet scanner for hackers. 🧡
A True Instrumentable Binary Emulation Framework
The FLARE team's open-source tool to identify capabilities in executable files.
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
收集的文章 https://mrwq.github.io/tools/paper/
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Syscall Shellcode Loader (Work in Progress)
FastJson全版本Docker漏洞环境(涵盖1.2.47/1.2.68/1.2.80等版本),主要包括JNDI注入及高版本绕过、waf绕过、文件读写、原生反序列化、利用链探测绕过、不出网利用等。从黑盒的角度覆盖FastJson深入利用
A lightweight, optionally typed expression language with a custom grammar for matching arbitrary Python objects.
LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
绕过AV/EDR的代码例子(Code example to bypass AV/EDR)
Event Tracing For Windows (ETW) Resources
Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory
xforcered / RemoteMonologue
Forked from 3lp4tr0n/RemoteMonologueWeaponizing DCOM for NTLM Authentication Coercions
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
Bypass Detection By Randomising ROR13 API Hashes
Interactive, dynamic, and realistic LLM honeypots