Lists (1)
Sort Name ascending (A-Z)
Stars
Bypass Credential Guard by patching WDigest.dll using only NTAPI functions
Port of Cobalt Strike's Process Inject Kit
#1 Locally hosted web application that allows you to perform various operations on PDF files
ScriptSentry finds misconfigured and dangerous logon scripts.
A proof-of-concept Remote Desktop (RDP) session hijack utility
NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.
A BOF to enumerate system process, their protection levels, and more.
Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)
Complete list of LPE exploits for Windows (starting from 2023)
poc for CVE-2024-38063 (RCE in tcpip.sys)
CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability
zimedev / certipy-merged
Forked from ly4k/CertipyTool for Active Directory Certificate Services enumeration and abuse
Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number of network packets...
This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository…
Create and modify Word documents with Python
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
Free HTML email templates for Mailchimp and other emails services
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
Create fake certs for binaries using windows binaries and the power of bat files
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation