0xEva's Stars
vletoux/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
itm4n/PrivescCheck
Privilege Escalation Enumeration Script for Windows
memN0ps/illusion-rs
Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)
binwiederhier/ntfy
Send push notifications to your phone or desktop using PUT/POST
ldpreload/BlackLotus
BlackLotus UEFI Windows Bootkit
s0md3v/Smap
a drop-in replacement for Nmap powered by shodan.io
netero1010/RDPHijack-BOF
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.
BishopFox/eyeballer
Convolutional neural network for analyzing pentest screenshots
bitsadmin/wesng
Windows Exploit Suggester - Next Generation
vxCrypt0r/Voidgate
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions, thus rendering memory scanners useless for that specific memory page.
HackerCalico/No_X_Memory_ShellCode_Loader
无可执行权限加载 ShellCode。Loading ShellCode without executable permission.
AlteredSecurity/Disable-TamperProtection
A POC to disable TamperProtection and other Defender / MDE components
basil00/Divert
WinDivert: Windows Packet Divert
p00n00b/2307-badusb
Make your 2307 badusb
brandonlw/Psychson
Phison 2251-03 (2303) Custom Firmware & Existing Firmware Patches (BadUSB)
sevagas/macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
intel/tinycrypt
tinycrypt is a library of cryptographic algorithms with a focus on small, simple implementation.
Orange-Cyberdefense/GOAD
game of active directory
Dec0ne/KrbRelayUp
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
antonioCoco/RemotePotato0
Windows Privilege Escalation from User to Domain Admin.
dirkjanm/BloodHound.py
A Python based ingestor for BloodHound
the-useless-one/pywerview
A (partial) Python rewriting of PowerSploit's PowerView
aniqfakhrul/powerview.py
Just another Powerview alternative
BeichenDream/GodPotato
ropnop/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
dirkjanm/krbrelayx
Kerberos unconstrained delegation abuse toolkit
NOBLES5E/cproxy
Easy per application transparent proxy built on cgroup.
hmgle/graftcp
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
gaoyifan/china-operator-ip
**运营商IPv4/IPv6地址库-每日更新
rofl0r/proxychains-ng
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.