Pinned Repositories
7heknight
7heknight.cpp
Lab C
7heknight.github.io
7heKnight.java
Lab Java OOP
7heknight.Pentest
No Descryption :D
7heknight.pwn
This respository is created to store the learning process of mine
7heknight.py
7heknight.research
My researched
AES_Cryptor
CVE-2020-0688
CVE-2020-0688_Microsoft Exchange default MachineKeySection deserialize vulnerability
7heKnight's Repositories
7heKnight/7heknight
7heKnight/7heknight.github.io
7heKnight/7heknight.Pentest
No Descryption :D
7heKnight/7heknight.pwn
This respository is created to store the learning process of mine
7heKnight/7heknight.py
7heKnight/7heknight.research
My researched
7heKnight/CVE-2020-0688
CVE-2020-0688_Microsoft Exchange default MachineKeySection deserialize vulnerability
7heKnight/jlscan
Joomla Scan Framework (in development)
7heKnight/7heknight.Windows_NativeAPI_Example
Windows_NativeAPI
7heKnight/ActiveDirectoryAttackTool
ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Controller. This tool is is best utilized using a set of known credentials against the host.
7heKnight/Advanced-SQL-Injection-Cheatsheet
A cheat sheet that contains advanced queries for SQL Injection of all types.
7heKnight/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
7heKnight/bWAPP_Repo
bWAPP
7heKnight/Cronos-Rootkit
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
7heKnight/dkkt-project
Azure Recon Tool (Capstone Project 2022)
7heKnight/elevationstation
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
7heKnight/gshell
A flexible and scalable cross-plaform shell generator tool
7heKnight/investigations
Indicators from Amnesty International's investigations
7heKnight/Microsoft-Activation-Scripts
A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
7heKnight/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
7heKnight/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
7heKnight/ProxyNotShell-PoC
7heKnight/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
7heKnight/RedTeam-Resources
7heKnight/Sandman
Sandman is a NTP based backdoor for red team engagements in hardened networks.
7heKnight/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
7heKnight/the-art-of-command-line
Master the command line, in one page
7heKnight/uac-bypass-oneliners
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
7heKnight/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
7heKnight/WindowsExploitationResources
Resources for Windows exploit development