BETONGUNO's Stars
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
decalage2/awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
S3cur3Th1sSh1t/WinPwn
Automation for internal Windows Penetrationtest / AD-Security
gtworek/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
WithSecureLabs/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
kitabisa/teler
Real-time HTTP Intrusion Detection
techgaun/github-dorks
Find leaked secrets via github search
mrd0x/BITB
Browser In The Browser (BITB) Templates
ThePorgs/Exegol
Fully featured and community-driven hacking environment
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
mikeroyal/Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
hackerschoice/gsocket
Connect like there is no firewall. Securely.
wavestone-cdt/EDRSandblast
Dec0ne/KrbRelayUp
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
0xsp-SRD/mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
mytechnotalent/Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
helpsystems/nanodump
The swiss army knife of LSASS dumping
tihanyin/PSSW100AVB
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
9emin1/charlotte
c++ fully undetected shellcode launcher ;)
optiv/Ivy
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
punk-security/smbeagle
SMBeagle - Fileshare auditing tool.
mgeeky/decode-spam-headers
A script that helps you understand why your E-Mail ended up in Spam
CCob/lsarelayx
NTLM relaying for Windows made easy
jfmaes/LazySign
Create fake certs for binaries using windows binaries and the power of bat files
MWR-CyberSec/PXEThief
PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager
Beercow/OneDriveExplorer
OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat and <UserCid>.dat.previous file.
trustedsec/SeeYouCM-Thief
dosxuz/DefenderStop
Stop Defender Service using C# via Token Impersonation
martinsohn/Office-phish-templates
Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from target user via verious methods.
forrest-orr/WizardOpium
Google Chrome Use After Free