
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Command-line client for WebSockets, like netcat (or curl) for ws:// with advanced socat-like functions
Important notes and topics on my journey towards mastering Windows Internals
Windows Internals Book 7th edition Tools
this repo is for windows privilege escalation technique
Shellcode encryptor using a substitution cipher with a randomly generated key.
π + π― + π = Everything you need to query Apple's FindMy network!
A fast and durable Pub/Sub channel over Websockets. FastAPI + WebSockets + PubSub == β‘ πͺ β€οΈ
Make websites accessible for AI agents
Collection of awesome LLM apps with AI Agents and RAG using OpenAI, Anthropic, Gemini and opensource models.
Shellcode loader that executes embedded Lua from Rust.
Validates priv escalation of AD trusts
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A library for detecting known secrets across many web frameworks
An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome and Firefox.
Operating Systems technical challenge based on the Windows Research Kernel
Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773
Rust Weaponization for Red Team Engagements.
Reverse shell generator written in Python 3.
My experiments in weaponizing Nim (https://nim-lang.org/)
Nim is a statically typed compiled systems programming language. It combines successful concepts from mature languages like Python, Ada and Modula. Its design focuses on efficiency, expressiveness,β¦
Compilation of Resources from TCM's Windows Priv Esc Udemy Course
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Six Degrees of Domain Admin
Powershell tool to automate Active Directory enumeration.