Lists (3)
Sort Name ascending (A-Z)
Stars
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
Open-source URL masking & analysis tool for security research, phishing awareness, and defensive testing. Demonstrates adversary techniques used to disguise malicious links.
A swiss army knife for pentesting networks
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Códigos soltos usados em respostas minhas no Stack Overflow em português
Collection of Cyber Threat Intelligence sources from the deep and dark web
cabelo / lama
Forked from advimman/lama🦙 LaMa Image Inpainting, Resolution-robust Large Mask Inpainting with Fourier Convolutions, WACV 2022
Notion as a platform for offensive operations
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
Collection of malware source code for a variety of platforms in an array of different programming languages.
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
Malware development for red teaming workshop
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
A helpful Java Deserialization exploit framework.
All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
Cnvd-2020-10487 / cve-2020-1938, scanner tool