-
Yo.
- 127.0.0.1
- @med0x2e
Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
The world’s 1st book of very detailed iOS App reverse engineering skills :)
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
A tool to perform Kerberos pre-auth bruteforcing
Identifies the bytes that Microsoft Defender flags on.
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
A post exploitation framework designed to operate covertly on heavily monitored environments
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
Tools, tips, tricks, and more for exploring ICS Security.
Shikata ga nai (仕方がない) encoder ported into go with several improvements
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
Situational Awareness commands implemented using Beacon Object Files
A tool for quickly evaluating IAM permissions in AWS.
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Defences against Cobalt Strike