Highlights
- Pro
Stars
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Kerberos manipulation library in pure Python
Tool for Active Directory Certificate Services enumeration and abuse
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
A curated list of Game Boy development resources such as tools, docs, emulators, related projects and open-source ROMs.
Bypass AMSI by patching AmsiScanBuffer
BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET
PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)
This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by…
Windows 10 UAC bypass for all executable files which are autoelevate true .
This repo contains some Amsi Bypass methods i found on different Blog Posts.
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
Automate the creation of a lab environment complete with security tooling and logging best practices
⚙️ A curated list of dynamic analysis tools and linters for all programming languages, binaries, and more.
Dozens of minimal operating systems to learn x86 system programming. Tested on Ubuntu 17.10 host in QEMU 2.10 and real hardware. Userland cheat at: https://github.com/cirosantilli/linux-kernel-modu…
A collaborative, multi-platform, red teaming framework
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
DotDotPwn - The Directory Traversal Fuzzer
SambaCry exploit and vulnerable container (CVE-2017-7494)
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
A swiss army knife for pentesting networks
A small utility to modify the dynamic linker and RPATH of ELF executables
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Also known by Microsoft as Knifecoat 🌶️
🤙 Security Trivia that rare people know.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities