- London, UK
- ajpc500.github.io
- @ajpc500
Stars
Python client for Microsoft Exchange Web Services (EWS)
A source generator to add a user-defined set of Win32 P/Invoke methods and supporting types to a C# project.
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
Simple (relatively) things allowing you to dig a bit deeper than usual.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain
A header-only C++ library for accessing files in COFF binary format. (Including Windows PE/PE+ formats)
A centralized resource for previously documented WDAC bypass techniques
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
Collection of DLL function export forwards for DLL export function proxying
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
Resolve syscall numbers at runtime for all Windows versions.
Collection of remote authentication triggers in C#
A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
My experiments in weaponizing Nim (https://nim-lang.org/)
Rust Weaponization for Red Team Engagements.
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
Cobalt Strike Malleable C2 Design and Reference Guide
StandIn is a small .NET35/45 AD post-exploitation toolkit
Collection of tools to use with Azure Applications
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit