Pinned Repositories
CollectRaptor
artefacts.help
https://artefacts.help/
FarsightAD
PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise
InfoSec-Notes
InfoSec Notes
MISC-AD_Trusts-SID
OffensivePythonPipeline
Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, and Make.
qazeer.github.io
Source code for qazeer.io
EDRSandblast
Qazeer's Repositories
Qazeer/OffensivePythonPipeline
Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, and Make.
Qazeer/FarsightAD
PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise
Qazeer/InfoSec-Notes
InfoSec Notes
Qazeer/qazeer.github.io
Source code for qazeer.io
Qazeer/MISC-AD_Trusts-SID
Qazeer/recon-ng-marketplace
Official module repository for the Recon-ng Framework.
Qazeer/SuperMem
A python script developed to process Windows memory images based on triage type.
Qazeer/artefacts.help
https://artefacts.help/
Qazeer/artifacts
Digital Forensics Artifact Repository
Qazeer/code-snippets
Various code snippets
Qazeer/bmc-tools-compiled
Compiled version of the bmc-tools.py Python script from ANSSI-FR's bmc-tools project
Qazeer/commando-vm
Complete Mandiant Offensive VM (Commando VM), the first full Windows-based penetration testing virtual machine distribution. The security community recognizes Kali Linux as the go-to penetration testing platform for those that prefer Linux. Commando VM is for penetration testers that prefer Windows. We know that building a Windows penetration testing environment can be tedious - we aim to streamline and simplify this process. Commando VM includes over 140 tools.
Qazeer/KapeFiles
This repository serves as a place for community created Targets and Modules for use with KAPE.
Qazeer/MemProcFS
MemProcFS
Qazeer/metasploit-framework
Metasploit Framework
Qazeer/Microsoft-Extractor-Suite
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
Qazeer/mplog_parser-compiled
Compiled version of the Python script from Intrinsec mplog_parser project
Qazeer/packer-windows
Windows Packer Templates
Qazeer/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
Qazeer/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
Qazeer/Privesc
Windows batch script that finds misconfiguration issues which can lead to privilege escalation.
Qazeer/Qazeer
Qazeer/velociraptor-docs
Documentation site for Velociraptor
Qazeer/Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.