-
MacroSec Ltd
- Nairobi, Kenya
- https://macrosec.tech
- All languages
- ASP.NET
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- Bicep
- Boo
- C
- C#
- C++
- CMake
- CSS
- D
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Nim
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YARA
- Zig
Starred repositories
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Tools, tips, tricks, and more for exploring ICS Security.
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Malware samples, analysis exercises and other interesting resources.
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
OSINT Project. Collect information from a mail. Gather. Profile. Timeline.
Microsoft » Windows 10 : Security Vulnerabilities
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
Weaponized Browser-in-the-Middle (BitM) for Penetration Testers
A fully functional DanderSpritz lab in 2 commands
HTML smuggling is not an evil, it can be useful
A library of pretexts to use on offensive phishing engagements.
The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into another.
Operating System Design Review: A systematic analysis of modern systems architecture
Chrome browser extension-based Command & Control
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters
Collection of tools to use with Azure Applications
Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged