Pinned Repositories
aad-sso-enum-brute-spray
POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
AES-PowerShellCode
Standalone version of my AES Powershell payload for Cobalt Strike.
awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
HandsOnBloodHound
Material for the "Hands-On BloodHound" Workshop
Internal-Pentest-Playbook
Internal Network Penetration Test Playbook
NetLoader
Loads any C# binary in mem, patching AMSI and bypassing Windows Defender
NorwegianPasswordSpraying
A repository containing lists and different combinations of weak/default passwords (in Norwegian) typically seen during external pentests and red team assessments. Contains seasons, months and holidays.
Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
SharpC2
.NET C2 Framework Proof of Concept
0xSV1's Repositories
0xSV1/awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
0xSV1/HandsOnBloodHound
Material for the "Hands-On BloodHound" Workshop
0xSV1/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
0xSV1/Aggressor-VYSEC
0xSV1/c-sharp-memory-injection
A set of scripts that demonstrate how to perform memory injection in C#
0xSV1/CarbonCopy
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
0xSV1/DAFT
DAFT: Database Audit Framework & Toolkit
0xSV1/defcon27_csharp_workshop
Writing custom backdoor payloads with C# - Defcon 27 Workshop
0xSV1/hidemyps
0xSV1/lterm
lterm is a small script built to install a bash hook for full terminal logging.
0xSV1/ordliste
liste over norske ord og navn
0xSV1/PowerUpSQL
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
0xSV1/PowerView3-Aggressor
Cobalt Strike Aggressor script menu for Powerview/SharpView
0xSV1/ProcessInjection
0xSV1/RdpThief
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
0xSV1/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
0xSV1/Salsa-tools
Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched
0xSV1/SharpFiles
0xSV1/slae32
Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)
0xSV1/SpookFlare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
0xSV1/stager.dll
Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/