Pinned Repositories
ADAPE-Script
Active Directory Assessment and Privilege Escalation Script
Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
bugz-tools
A collection of tools I wrote for bug bounty or hacking and don't mind publishing it :smile:
Burp-Suite-tools
List of Burp Suite tools for bug bounty hunting
CACTUSTORCH
CACTUSTORCH: Payload Generation for Adversary Simulations
CVE-2023-29357-ExE
Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec
EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
Hunt
Repository that contains a list of subdomains for bug bounty hunting
Pentest-ZOne
Simple Penetration Testing Scanner
wesng
Windows Exploit Suggester - Next Generation
KeyStrOke95's Repositories
KeyStrOke95/Hunt
Repository that contains a list of subdomains for bug bounty hunting
KeyStrOke95/CVE-2023-29357-ExE
Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec
KeyStrOke95/Burp-Suite-tools
List of Burp Suite tools for bug bounty hunting
KeyStrOke95/CVE-2022-33679
One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
KeyStrOke95/CVE-2022-38374
KeyStrOke95/CVE-2022-39952
POC for CVE-2022-39952
KeyStrOke95/CVE-2023-34362
MOVEit CVE-2023-34362
KeyStrOke95/Augustus
Evasive Golang Loader
KeyStrOke95/Blackout
kill anti-malware protected processes (BYOVD)
KeyStrOke95/citrixInspector
Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519
KeyStrOke95/CS-Remote-OPs-BOF
KeyStrOke95/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
KeyStrOke95/CVE-2023-36874
KeyStrOke95/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
KeyStrOke95/DragonCastle
A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.
KeyStrOke95/GIUDA
Ask a TGS on behalf of another user without password
KeyStrOke95/heckitwithstyle.nl
This blog is a personal summary of what I have learned while reading other blog posts.
KeyStrOke95/leaky-paths
A collection of special paths linked to common internal paths, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
KeyStrOke95/MaldevAcademyLdr.1
KeyStrOke95/MalwareSamples
This repository contains some malware samples to be delivered on target systems.
KeyStrOke95/mhydeath
Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.
KeyStrOke95/NoFilter
KeyStrOke95/oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
KeyStrOke95/Oneliner-Bugbounty
A collection oneliner scripts for bug bounty
KeyStrOke95/OpenSSLSee2
Establish undetected C2 session from a Windows clients to the OpenSSL server
KeyStrOke95/Penetration-Testing-Azure-for-Ethical-Hackers
Penetration Testing Azure for Ethical Hackers, published by Packt
KeyStrOke95/ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
KeyStrOke95/TeamFiltration
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
KeyStrOke95/UserManagerEoP
KeyStrOke95/Weblogic
WebLogic vulnerability exploration from beginner to expert.