Pinned Repositories
ADAPE-Script
Active Directory Assessment and Privilege Escalation Script
Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
bugz-tools
A collection of tools I wrote for bug bounty or hacking and don't mind publishing it :smile:
Burp-Suite-tools
List of Burp Suite tools for bug bounty hunting
CACTUSTORCH
CACTUSTORCH: Payload Generation for Adversary Simulations
CVE-2023-29357-ExE
Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec
EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
Hunt
Repository that contains a list of subdomains for bug bounty hunting
Pentest-ZOne
Simple Penetration Testing Scanner
wesng
Windows Exploit Suggester - Next Generation
KeyStrOke95's Repositories
KeyStrOke95/CVE-2023-29357-ExE
Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec
KeyStrOke95/Hunt
Repository that contains a list of subdomains for bug bounty hunting
KeyStrOke95/CVE-2023-34362
MOVEit CVE-2023-34362
KeyStrOke95/OpenSSLSee2
Establish undetected C2 session from a Windows clients to the OpenSSL server
KeyStrOke95/StorSvcPrivescPathFinder
This PowerShell script enumerates writable directories from the PATH environment variable for the current user. It is specifically designed to identify paths that may be exploited for DLL injection to achieve privilege escalation, particularly by targeting the SvcRebootToFlashingMode method of the StorSvc service.
KeyStrOke95/AMSI-BYPASS
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
KeyStrOke95/Augustus
Evasive Golang Loader
KeyStrOke95/Blackout
kill anti-malware protected processes (BYOVD)
KeyStrOke95/citrixInspector
Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519
KeyStrOke95/CVE-2023-36874
KeyStrOke95/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
KeyStrOke95/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
KeyStrOke95/GIUDA
Ask a TGS on behalf of another user without password
KeyStrOke95/GPTPoC
KeyStrOke95/heckitwithstyle.nl
This blog is a personal summary of what I have learned while reading other blog posts.
KeyStrOke95/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
KeyStrOke95/MaldevAcademyLdr.1
KeyStrOke95/MalwareSamples
This repository contains some malware samples to be delivered on target systems.
KeyStrOke95/mhydeath
Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.
KeyStrOke95/NoFilter
KeyStrOke95/oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
KeyStrOke95/Oneliner-Bugbounty
A collection oneliner scripts for bug bounty
KeyStrOke95/pe_to_shellcode
Converts PE into a shellcode
KeyStrOke95/Penetration-Testing-Azure-for-Ethical-Hackers
Penetration Testing Azure for Ethical Hackers, published by Packt
KeyStrOke95/powerview.py
Just another Powerview alternative
KeyStrOke95/Rustic64Shell
64-bit, position-independent reverse tcp shell, built in Rust for Windows.
KeyStrOke95/ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
KeyStrOke95/susinternals
psexecsvc - a python implementation of PSExec's native service implementation
KeyStrOke95/UserManagerEoP
KeyStrOke95/Voidmaw
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables that will be flagged by the antimalware programs(such as mimikatz).