Ak74-577's Stars
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
1N3/Sn1per
Attack Surface Management Platform
pwntester/ysoserial.net
Deserialization payload generator for a variety of .NET formatters
abcz316/SKRoot-linuxKernelRoot
新一代SKRoot,挑战全网root检测手段,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,全程不需要暂停SELinux,实现真正的SELinux 0%触碰,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。
l3m0n/Bypass_Disable_functions_Shell
一个各种方式突破Disable_functions达到命令执行的shell
Meckazin/ChromeKatz
Dump cookies and credentials directly from Chrome/Edge process memory
7etsuo/windows-api-function-cheatsheets
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
HadessCS/Red-team-Interview-Questions
Red team Interview Questions
fortra/No-Consolation
A BOF that runs unmanaged PEs inline
helviojunior/hookchain
HookChain: A new perspective for Bypassing EDR Solutions
xkaneiki/CVE-2023-0386
CVE-2023-0386在ubuntu22.04上的提权
lypd0/DeadPotato
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
CICADA8-Research/IHxExec
Process injection alternative
CCob/DRSAT
Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies
sailay1996/WerTrigger
Weaponizing for privileged file writes bugs with windows problem reporting
shaddy43/BrowserSnatch
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer
CICADA8-Research/COMThanasia
A set of programs for analyzing common vulnerabilities in COM
sun977/linuxcheckshoot
linux应急响应检查脚本单机终极版
safedv/RustSoliloquy
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
itm4n/PPLrevenant
Bypass LSA protection using the BYODLL technique
rotarydrone/GlobalUnProtect
Decrypt GlobalProtect configuration and cookie files.
klezVirus/RpcProxyInvoke
Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar
0xv1n/RemoteSessionEnum
Remotely Enumerate sessions using undocumented Windows Station APIs
passthehashbrowns/VectoredExceptionHandling
IncludeSecurity/c2-vulnerabilities
PoCs of RCEs against open source C2 servers
P0x00/ASPX_Bonanza
ASPX ShellCode Loader
FunnyWhaleDev/AlterLoadDll
Load dll with undocumented functions and debug symbols
sud0Ru/NauthNRPC
Enumerate Domain Users Without Authentication
S12cybersecurity/PDFTypeSpoofing
PDF Icon File Type Spoofer