Pinned Repositories
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
beautiful-jekyll
✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com
betwixt
:zap: Web Debugging Proxy based on Chrome DevTools Network panel.
caldera
Scalable Automated Adversary Emulation Platform
chromebackdoor
Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicious extension or script on most popular browsers, and send all DOM datas on command and control.
HatVenom
HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
4V4loon's Repositories
4V4loon/AlanFramework
A C2 post-exploitation framework
4V4loon/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
4V4loon/awesome-hacking-1
A curated list of awesome Hacking tutorials, tools and resources
4V4loon/c2compiler
the c2 programming language
4V4loon/C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
4V4loon/CVE-2023-24955-PoC
Exploit for Microsoft SharePoint 2019
4V4loon/CVE-2023-38831
CVE-2023-38831 PoC (Proof Of Concept)
4V4loon/CVE-2024-30088
4V4loon/CVE-2024-38063-POC
Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.
4V4loon/cve-2024-6387-poc
4V4loon/CVE-2024-7479_CVE-2024-7481
TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
4V4loon/DeimosC2
DeimosC2 is a Golang command and control framework for post-exploitation.
4V4loon/GodGenesis
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
4V4loon/gpt4-captcha-bypass
Captcha Bypass using GPT4-o
4V4loon/GraphSpy
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
4V4loon/hibernateAndJpa
initial
4V4loon/ItsNotASecurityBoundary
4V4loon/Orcus-1.9.1-src
Full Orcus 1.9.1 Source Code
4V4loon/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
4V4loon/Prismatica
Responsive Command and Control System
4V4loon/proxify
Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
4V4loon/proxyee
HTTP proxy server,support HTTPS&websocket.MITM impl,intercept and tamper HTTPS traffic.
4V4loon/smtpsmug
4V4loon/Spark
✨Spark is a web-based, cross-platform and full-featured Remote Administration Tool (RAT) written in Go that allows you control all your devices anywhere. Spark是一个Go编写的,网页UI、跨平台以及多功能的远程控制和监控工具,你可以随时随地监控和控制所有设备。
4V4loon/todo-list
4V4loon/tools
Somes tools and scripts
4V4loon/VSTO-POC
A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously
4V4loon/warcprox
WARC writing MITM HTTP/S proxy
4V4loon/wazuh-kubernetes
Wazuh - Wazuh Kubernetes
4V4loon/windows-extension-exploit
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension