Stars
Situational Awareness commands implemented using Beacon Object Files
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
The repo contains a series of challenges for learning Frida for Android Exploitation.
A Bind Shell Using the Fax Service and a DLL Hijack
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Utility to craft HTML or SVG smuggled files for Red Team engagements
Burpsuite Extension to bypass 403 restricted directory
xforcered / SQLRecon
Forked from skahwah/SQLReconA C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
An evolving how-to guide for securing a Linux server.
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
An open source threat modeling tool from OWASP
optiv / evilginx2
Forked from eth3real/evilginx2Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Wiki to collect Red Team infrastructure hardening resources
PoCs and tools for investigation of Windows process execution techniques
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
Simple (relatively) things allowing you to dig a bit deeper than usual.
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…
Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Windows x64 handcrafted token stealing kernel-mode shellcode
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.