Pinned Repositories
adalanche
Active Directory ACL Visualizer - who's really Domain Admin?
avml
AVML - Acquire Volatile Memory for Linux
Awesome-Azure-Pentest
A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.
AzureHunter
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
chainbreaker
Mac OS X Keychain Forensic Tool
chisel-OPSAFE
A fast TCP/UDP tunnel over HTTP
CVE-2020-15778-Exploit
Exploit for CVE-2020-15778(OpenSSH vul)
CVE-2021-1675
CVE-2021-1675 Detection Info
Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
SystemNightmare
Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows
5M7X's Repositories
5M7X/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
5M7X/awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
5M7X/clash
A rule-based tunnel in Go.
5M7X/clash-verge
A Clash GUI based on tauri. Supports Windows, macOS and Linux.
5M7X/Cloud-Security-Attacks
Azure and AWS Attacks
5M7X/cloudfox
Automating situational awareness for cloud penetration tests.
5M7X/Codecepticon
5M7X/Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.
5M7X/DumpThatLSASS
Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation , it contains Anti-sandbox , if you run it under Virtual Machine you need to uncomment the code related to it and recompile.
5M7X/Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
5M7X/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
5M7X/eviltree
A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlighting those that contain matches.
5M7X/ExecRemoteAssembly
Execute Remote Assembly with args passing and with AMSI and ETW patching
5M7X/FilelessRemotePE
Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique
5M7X/fzf
:cherry_blossom: A command-line fuzzy finder
5M7X/HandleKatz
PIC lsass dumper using cloned handles
5M7X/Havoc
The Havoc Framework
5M7X/impersonate
A windows token impersonation tool
5M7X/JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
5M7X/kc7
A cybersecurity game in Azure Data Explorer
5M7X/LockBit-Black-Builder
5M7X/Masky
Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory
5M7X/nanodump
A crappy LSASS dumper with no ASCII art
5M7X/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
5M7X/ps4-exploit-host
Easy Exploit Hosting
5M7X/Red-Team-Management
5M7X/RustHound
Active Directory data collector for BloodHound written in rust. 🦀
5M7X/ShadowSpray
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.
5M7X/SharpGmailC2
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
5M7X/trufflehog
Find credentials all over the place