Pinned Repositories
amass
OWASP 開源情資工具
Bypass_Disable_functions_Shell
一个各种方式突破Disable_functions达到命令执行的shell
Certipy
專打AD_CS ESC1-ESC8
chashell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
fastfluxanalysis
Scripts to detect Fast-Flux and DGA using DNS query responses
introduce-myself
Invoke-PSObfuscation
An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.
ldeep
In-depth ldap enumeration utility
Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
0xMafty's Repositories
0xMafty/Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
0xMafty/amass
OWASP 開源情資工具
0xMafty/Bypass_Disable_functions_Shell
一个各种方式突破Disable_functions达到命令执行的shell
0xMafty/Certipy
專打AD_CS ESC1-ESC8
0xMafty/chashell
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
0xMafty/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
0xMafty/fastfluxanalysis
Scripts to detect Fast-Flux and DGA using DNS query responses
0xMafty/introduce-myself
0xMafty/Invoke-PSObfuscation
An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.
0xMafty/ldeep
In-depth ldap enumeration utility
0xMafty/NetExec
The Network Execution Tool
0xMafty/NYCU-HW
0xMafty/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
0xMafty/ocd-mindmaps
AD目錄攻擊的所有方法
0xMafty/osv-scanner
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
0xMafty/PEzor
Open-Source Shellcode & PE Packer
0xMafty/rbcd-attack
Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket
0xMafty/sliver
開源C2
0xMafty/StandIn
StandIn is a small .NET35/45 AD post-exploitation toolkit
0xMafty/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
0xMafty/symboliclink-testing-tools
0xMafty/Veil
Veil 3.1.X (Check version info in Veil at runtime)
0xMafty/webshell
免杀webshell生成工具
0xMafty/Webshell-loader
ASPX内存执行shellcode,绕过Windows Defender(AV/EDR)