- SL,UT
Stars
A collection of various awesome lists for hackers, pentesters and security researchers
A collection of awesome penetration testing resources, tools and other shiny things
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
Wiki to collect Red Team infrastructure hardening resources
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
File upload vulnerability scanner and exploitation tool.
ScareCrow - Payload creation framework designed around EDR bypass.
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
A post exploitation framework designed to operate covertly on heavily monitored environments
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
A workshop about Malware Development
Orange Cyberdefense mindmaps
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
RedSnarf is a pen-testing / red-teaming tool for Windows environments
Active Directory Assessment and Privilege Escalation Script
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
PEN-300 collection to help you on your exam.
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Convert Cobalt Strike profiles to modrewrite scripts
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule