Pinned Repositories
AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
ARL
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
AvoidRandomKill
一次免杀实践(bypass 360、huorong、windows defender、kaspersky、)
Binary-Learning
二进制安全相关的学习笔记,感谢滴水逆向的所有老师辛苦教学。
CallBackDump-CS
Lsass memory dump.
cf
Cloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作
CSharp-Alt-Shellcode-Callbacks
A collection of (even more) alternative shellcode callback methods in CSharp
CVE-2022-21445
CVE-2022-21445
LinuxEelvation
Linux Eelvation(持续更新)
SkyShadow
dll劫持批量
M0chae1's Repositories
M0chae1/CVE-2022-21445
CVE-2022-21445
M0chae1/SkyShadow
dll劫持批量
M0chae1/AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
M0chae1/ARL
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
M0chae1/AvoidRandomKill
一次免杀实践(bypass 360、huorong、windows defender、kaspersky、)
M0chae1/cf
Cloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作
M0chae1/CSharp-Alt-Shellcode-Callbacks
A collection of (even more) alternative shellcode callback methods in CSharp
M0chae1/f403
用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
M0chae1/faces
M0chae1/FineReport_channel_Deserialization_Vulnerabilities_RCE
FineReport channel Deserialization Vulnerabilities RCE
M0chae1/fscan
一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。
M0chae1/godzillaLaunch
快速启动godzilla
M0chae1/JavaSec
a rep for documenting my study, may be from 0 to 0.1
M0chae1/JavaUnserializeChain
自己积累的一些Java反序列化利用链
M0chae1/Kernelhub
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
M0chae1/libpeconv_and_detours_tpl
A template for projects using both libPeConv and MS Detours
M0chae1/OffensiveCpp
This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
M0chae1/PingRAT
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
M0chae1/Practice-AD-CS-Domain-Escalation
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
M0chae1/ProxyDll
beta
M0chae1/pwnfaces
Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)
M0chae1/SharpAlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks Rewrite In C#
M0chae1/SharpDPAPI
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
M0chae1/SharpVeeamDecryptor
Decrypt Veeam database passwords
M0chae1/SpringBootExploit
项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
M0chae1/StarFile-tools
星火实验室GUI工具框架
M0chae1/VcenterKiller
一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接
M0chae1/VX-API
Collection of various malicious functionality to aid in malware development
M0chae1/WebShell-Bypass-Guide
从零学习Webshell免杀手册
M0chae1/wsMemShell
WebSocket 内存马/Webshell,一种新型内存马/WebShell技术