Lists (1)
Sort Name ascending (A-Z)
Stars
A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.
A Rust wrapper over Microsoft's MiMalloc memory allocator
XCap is a cross-platform screen capture library written in Rust. It supports Linux (X11, Wayland), MacOS, and Windows. XCap supports screenshot and video recording (WIP).
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
The GZ::CTF project, an open source CTF platform.
P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke
This repo covers some code execution and AV Evasion methods for Macros in Office documents
IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then reflective load the C# project.
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
A Collection of Over 60 Scripts - updated specifically for the BadUSB function on the FlipperZero.
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Program for determining types of files for Windows, Linux and MacOS.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
https://twitter.com/itsreallynick/status/1120410950430089224
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
LFI Payloads List coolected from github repos
Run unpatched dynamic binaries on NixOS [maintainer=@Mic92]
Source code of exploiting windows API for red teaming series
reveal.js on steroids! Get beautiful reveal.js presentations from any Markdown file
A guide on how to setup the Taskserver.
QOwnNotes is a plain-text file notepad and todo-list manager with Markdown support and Nextcloud / ownCloud integration.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents