JoelGMSec
● Senior Red Team Cybersecurity Expert ● Ex-CTO @ Cyberguard ● SysAdmin +10 years ● Creator of AutoRDPwn: The Shadow Attack Framework
Deloitte Touche Tohmatsu LimitedBarcelona, Spain
JoelGMSec's Stars
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
mandiant/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
CyberSecurityUP/OSCE3-Complete-Guide
OSWE, OSEP, OSED, OSEE
Pennyw0rth/NetExec
The Network Execution Tool
Notselwyn/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
ldpreload/BlackLotus
BlackLotus UEFI Windows Bootkit
ThePorgs/Exegol
Fully featured and community-driven hacking environment
SysSec-KAIST/LTESniffer
An Open-source LTE Downlink/Uplink Eavesdropper
WKL-Sec/HiddenDesktop
HVNC for Cobalt Strike
OmerYa/Invisi-Shell
Hide your Powershell script in plain sight. Bypass all Powershell security features
magicsword-io/LOLDrivers
Living Off The Land Drivers
bitsadmin/nopowershell
PowerShell rebuilt in C# for Red Teaming purposes
silverhack/monkey365
Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews.
0xb11a1/yetAnotherObfuscator
C# obfuscator that bypass windows defender
AggressiveUser/AllForOne
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,
itm4n/FullPowers
Recover the default privilege set of a LOCAL/NETWORK SERVICE account
Dec0ne/DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
reveng007/DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
foxlox/GIUDA
Ask a TGS on behalf of another user without password
wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
wh0amitz/PetitPotato
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
RedTeamPentesting/resocks
mTLS-Encrypted Back-Connect SOCKS5 Proxy
SaadAhla/TakeMyRDP
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
g3tsyst3m/elevationstation
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
jfjallid/go-secdump
Tool to remotely dump secrets from the Windows registry
pwndoc-ng/pwndoc-ng
Pentest Report Generator
slemire/WSPCoerce
PoC to coerce authentication from Windows hosts using MS-WSP
MythicAgents/Medusa
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
Leo4j/Invoke-SessionHunter
Retrieve and display information about active user sessions on remote computers. No admin privileges required.
HynekPetrak/sshame
brute force SSH public-key authentication