Pinned Repositories
0day-security-software-vulnerability-analysis-technology
0day安全_软件漏洞分析技术
1000php
1000个PHP代码审计案例(2016.7以前乌云公开漏洞)
1135-CobaltStrike-ToolKit
about CobaltStrike
360SafeBrowsergetpass
这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。
520apkhook
把msf生成的安卓远控附加进普通的app中,并进行加固隐藏特征。可以绕过常见的手机安全管家。
Active-Directory-Pentest-Notes
个人域渗透学习笔记
AppInfoScanner
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
arsenal
Arsenal is just a quick inventory and launcher for hacking programs
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
NimRDI
RDI implementation in Nim
GitttttBottttt's Repositories
GitttttBottttt/Bundler-bypass
免杀捆绑器,过主流杀软。A Bundler bypass anti-virus
GitttttBottttt/BurpAppletPentester
SessionKey解密插件
GitttttBottttt/Cloud-Bucket-Leak-Detection-Tools
六大云存储,泄露利用检测工具
GitttttBottttt/CrackSleeve4.5
CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.
GitttttBottttt/CVE-2022-0847
CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”
GitttttBottttt/CVE-2022-0847-DirtyPipe-Exploit
A root exploit for CVE-2022-0847 (Dirty Pipe)
GitttttBottttt/elearning
elearning linux/mac/db/cache/server/tools/人工智能
GitttttBottttt/FileGuard
File crypter and packing utility
GitttttBottttt/GetWindowsCredentials
通过WindowsAPI获取用户凭证,并保存到文件中
GitttttBottttt/InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
GitttttBottttt/iscsicpl_bypassUAC
UAC bypass for x64 Windows 7 - 11(无弹窗版)
GitttttBottttt/KaynLdr
KaynLdr is a Reflective Loader written in C/ASM
GitttttBottttt/Kraken
Kraken, a modular multi-language webshell coded by @secu_x11
GitttttBottttt/MailDOG
GitttttBottttt/malleable-c2
Cobalt Strike Malleable C2 Design and Reference Guide
GitttttBottttt/NimDllSideload
DLL sideloading/proxying with Nim!
GitttttBottttt/NimHollow
Nim implementation of Process Hollowing using syscalls (PoC)
GitttttBottttt/nimpy
Nim - Python bridge
GitttttBottttt/note
记录自己写的工具和学习笔记
GitttttBottttt/PPN
Pentester's Promiscuous Notebook
GitttttBottttt/PSSW100AVB
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
GitttttBottttt/ReBeacon_Src
GitttttBottttt/Red-Team-Advent-of-Code
Red Teaming / Pentesting challenges for my Advent-Of-Code 2021.
GitttttBottttt/schtask-bypass
免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus
GitttttBottttt/SecurityList
A list for Web Security and Code Audit
GitttttBottttt/sshdHooker
注入SSHD进程并记录ssh登录的密码
GitttttBottttt/steganography
Simple C++ Image Steganography tool to encrypt and hide files insde images using Least-Significant-Bit encoding.
GitttttBottttt/usefull-code
usefull-code
GitttttBottttt/WarFox
An HTTPS beaconing Windows implant and multi-layered proxy C2 network designed for covert APT emulation focused offensive operations
GitttttBottttt/ZeroLogon
CVE-2020-1472 C++