- localhost:1337
- thecybersimon.com
- https://writeups.thecybersimon.com/writeups/
Lists (1)
Sort Name ascending (A-Z)
Stars
A pure Python HTML5 parser that just works. No C extensions to compile. No system dependencies to install. No complex API to learn.
A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp /…
A cross-platform ad blocker for macOS, Linux, and Windows that blocks ads by modifying your systems hosts file. The tool downloads and merges hosts files from multiple trusted sources to create a c…
A lightweight WPF application that adds a customizable glowing edge light effect around your primary monitor
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.
Readest is a modern, feature-rich ebook reader designed for avid readers offering seamless cross-platform access, powerful tools, and an intuitive interface to elevate your reading experience.
SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.
A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.
pwninit - automate starting binary exploit challenges
CTF framework and exploit development library
slemire / SuperMega
Forked from dobin/SuperMegaStealthily inject shellcode into an executable
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.
SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection support.
PoC to coerce authentication from Windows hosts using MS-WSP
Implementation of Sleep Obfuscation to evade memory scanners and hooks by indirect syscalls through ROP chains
Reorders and chains shellcode instruction so they evade Yara signatures
Powershell tool to automate Active Directory enumeration.
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
Kerberos relaying and unconstrained delegation abuse toolkit
Execute commands interactively on remote Windows machines using the WinRM protocol
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
A fast, simple, recursive content discovery tool written in Rust.