Pinned Repositories
Blackbone
Windows memory hacking library
CVE-2020-12116
Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.
insecure-coding-examples
Code examples for the talk Secure Coding Practices in C++
Obligato
This project is an implant framework designed for long term persistent access to Windows machines.
Persistence
redsails
RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: https://www.youtube.com/watch?v=Ul8uPvlOsug
RegistryExtraction
A python script that will extract the SAM, SYSTEM, and SECURITY registry hive files to C:\ for easy extraction.
RemoteProcessScanner
Enumerate verbose process information on remote endpoints via WMI
SpoolSploit
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
WeBeater3
BeetleChunks's Repositories
BeetleChunks/SpoolSploit
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
BeetleChunks/redsails
RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: https://www.youtube.com/watch?v=Ul8uPvlOsug
BeetleChunks/Obligato
This project is an implant framework designed for long term persistent access to Windows machines.
BeetleChunks/CVE-2020-12116
Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.
BeetleChunks/WeBeater3
BeetleChunks/RemoteProcessScanner
Enumerate verbose process information on remote endpoints via WMI
BeetleChunks/RegistryExtraction
A python script that will extract the SAM, SYSTEM, and SECURITY registry hive files to C:\ for easy extraction.
BeetleChunks/Blackbone
Windows memory hacking library
BeetleChunks/insecure-coding-examples
Code examples for the talk Secure Coding Practices in C++
BeetleChunks/Mojibake
Package with useful methods for managing data encodings
BeetleChunks/PentestStuff
Just a dumping ground of stuff I may use or reference on engagements
BeetleChunks/CVE-2021-1675
C# and Impacket implementation of CVE-2021-1675/PrintNightmare
BeetleChunks/exploits
A collection of exploit code I've written
BeetleChunks/GH-Injector-GUI
BeetleChunks/impacket
Impacket is a collection of Python classes for working with network protocols.
BeetleChunks/kmexts
Simple driver to register all available process, thread, image, Registry, and Object callbacks
BeetleChunks/AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
BeetleChunks/AC
AssaultCube
BeetleChunks/AES
C++ AES implementation
BeetleChunks/BitcoinUtils
Simple set of functions to test bitcoin address generation
BeetleChunks/cpp-base64
base64 encoding and decoding with c++
BeetleChunks/Empire
Empire is a pure PowerShell post-exploitation agent.
BeetleChunks/GH-Injector-Library
A feature rich DLL injection library.
BeetleChunks/NT_OS
BeetleChunks/PortScanner
Simple C++ TCP port scanner
BeetleChunks/PrintNightmare
BeetleChunks/reactos
A free Windows-compatible Operating System
BeetleChunks/rootkit.com
Mirror of users section of rootkit.com
BeetleChunks/Sark
IDAPython Made Easy
BeetleChunks/WindowsEnumeration
C++ tools for remote and local enumeration