Pinned Repositories
acCOMplice
Tools for discovery and abuse of COM hijacks
AntiDebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
AssemblyLoader
Loads .NET Assembly Via CLR Loader
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
NessusValidator
My-Mr-E's Repositories
My-Mr-E/acCOMplice
Tools for discovery and abuse of COM hijacks
My-Mr-E/AntiDebugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
My-Mr-E/Beginners-Guide-to-Obfuscation
My-Mr-E/certexp
Certificate Export Utility
My-Mr-E/Change-Lockscreen
Offensive tool to trigger network authentications as SYSTEM
My-Mr-E/com-rs
A Rust Crate for Creating and Consuming COM APIs
My-Mr-E/CVE-2020-0668
Use CVE-2020-0668 to perform an arbitrary privileged file move operation.
My-Mr-E/CVE-2020-0796
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
My-Mr-E/defcon27_csharp_workshop
Writing custom backdoor payloads with C# - Defcon 27
My-Mr-E/diaghub
Loads a custom dll in system32 via diaghub.
My-Mr-E/donutCS
dem sharp donuts
My-Mr-E/endgame
An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈
My-Mr-E/hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
My-Mr-E/kinject
Kernel shellcode injector
My-Mr-E/lsassy
Extract credentials from lsass remotely
My-Mr-E/metasploit-execute-assembly
Custom Metasploit post module to executing a .NET Assembly from Meterpreter session
My-Mr-E/MiscTools
Miscellaneous Tools
My-Mr-E/ObjectExplorer
Windows Kernel Object Explorer
My-Mr-E/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
My-Mr-E/ProcessInjection
This program is designed to demonstrate various process injection techniques
My-Mr-E/RecycledGate
Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll
My-Mr-E/Reg1c1de
Registry permission scanner written in C# for finding potential privesc avenues within registry
My-Mr-E/ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
My-Mr-E/Seth
Perform a MitM attack and extract clear text credentials from RDP connections
My-Mr-E/SharPersist
My-Mr-E/SK8RAT
C++ implant that interfaces with a SK8PARK server
My-Mr-E/SysWhispers
AV/EDR evasion via direct system calls.
My-Mr-E/TheWover.github.io
Blog. Watch the repo to subscribe
My-Mr-E/UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
My-Mr-E/UsoDllLoader
Windows - Weaponizing privileged file writes with the Update Session Orchestrator service