Lists (15)
Sort Newest
Stars
Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.
PowerShell tools to help defenders hunt smarter, hunt harder.
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
p2p tunnel,(udp mode work with kcp,https://github.com/skywind3000/kcp)
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.
Dshell is a network forensic analysis framework.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A tool to dump a git repository from a website
Password list generator for password spraying - prebaked with goodies
Nuke It From Orbit - remove AV/EDR with physical access
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
A cheat sheet that contains advanced queries for SQL Injection of all types.
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callb…
這份筆記是關於 Angelboy 2022 年在臺灣好厲駭開的 Windows Binary Exploitation 課程,內含個人撰寫的解題腳本、課堂筆記、以及自行設計的課堂練習題和架設腳本
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
An Active Directory pwn collection written in shell script
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.