Pinned Repositories
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
awesome-intelligence-writing
Awesome collection of great and useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles
AzureC2Relay
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
beacon-fronting
A simple command line program to help defender test their detections for network beacon patterns and domain fronting
chameleon
PowerShell Script Obfuscator
Chimera
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
CREST-Exam-Prep
Cheatsheets and write ups for the CREST CRT and CCT Exams.
CREST-Mock-Exam
CREST CCT Mock Exam Paper
DetectCobaltStomp
Detects Module Stomping as implemented by Cobalt Strike
Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Aajnow's Repositories
Aajnow/CREST-Exam-Prep
Cheatsheets and write ups for the CREST CRT and CCT Exams.
Aajnow/CREST-Mock-Exam
CREST CCT Mock Exam Paper
Aajnow/beacon-fronting
A simple command line program to help defender test their detections for network beacon patterns and domain fronting
Aajnow/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Aajnow/awesome-intelligence-writing
Awesome collection of great and useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles
Aajnow/AzureC2Relay
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
Aajnow/chameleon
PowerShell Script Obfuscator
Aajnow/Chimera
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Aajnow/DetectCobaltStomp
Detects Module Stomping as implemented by Cobalt Strike
Aajnow/Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Aajnow/CobaltStr4.5
Cobalt Strike 4.5 cracked version.
Aajnow/forest-trust-tools
Proof-of-concept tools for my AD Forest trust research
Aajnow/FunctionStomping
A new shellcode injection technique. Given as C++ header or standalone Rust program.
Aajnow/HackBrowserData
Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Aajnow/InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
Aajnow/jimi
Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch jimi has developed into a fully fledged IT automation platform which effortlessly integrates with your existing tools unlocking the potential for autonomous IT and Security operations.
Aajnow/LNKMod
C# project to create or modify existing LNKs
Aajnow/meg
Fetch many paths for many hosts - without killing the hosts
Aajnow/mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
Aajnow/ntfy
Send push notifications to your phone or desktop using PUT/POST
Aajnow/Pentest-Tools-Collection
Aajnow/PrintNightmare
Aajnow/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
Aajnow/redirect.rules
Quick and dirty dynamic redirect.rules generator
Aajnow/rpcfirewall
Aajnow/slimjim
A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"
Aajnow/SysWhispers2BOF
Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs
Aajnow/ThePhish
ThePhish: an automated phishing email analysis tool
Aajnow/vortex
VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit
Aajnow/WFH