Pinned Repositories
axiom
The dynamic infrastructure framework for anybody!
BatchObfuscator
Simple obfuscator for batch script
BruteDum
BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
btt_setting
C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
cobalt_strike_extension_kit
Attempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
CrackMapExec
A swiss army knife for pentesting networks
debug_Threejs_morphTarget
Three.js morphTarget regression r69->r70 debugging
EternalBlue-MSF-Automation
Automation script for the Eternal Blue & Double Pulsar Metasploit exploit.
PythonRaft
收集渗透测试中的Python脚本
R0ckNRolla's Repositories
R0ckNRolla/BruteDum
BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
R0ckNRolla/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
R0ckNRolla/badusb_botnet
:busts_in_silhouette::smiling_imp: Infect a pc with badusb and establish a connection through telegram.
R0ckNRolla/BlueKeep
Proof of concept for CVE-2019-0708
R0ckNRolla/CarbonCopy
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
R0ckNRolla/Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
R0ckNRolla/CobaltStrike-xor
R0ckNRolla/cobaltstrike3.13
cracked
R0ckNRolla/CVE-2019-0708
dump
R0ckNRolla/de4dot
.NET deobfuscator and unpacker.
R0ckNRolla/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
R0ckNRolla/Get-NetNTLM
Powershell module to get the NetNTLMv2 hash of the current user
R0ckNRolla/hackingLibrary
APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade anti-virus detection, Rookit CYPTER, Antiviruses Bypassing-av, social engineering,WORMS,Sandbox-Escape, Memory-injection, Ethical,Gray,White,RedTeam,Bugbounty,bug hunter,Cheat Sheet...
R0ckNRolla/ImpersonateSystem
Impersonate Windows built-in SYSTEM account
R0ckNRolla/K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/Exploit/APT/0day/Shellcode/Payload/priviledge/OverFlow/WebShell/PenTest)
R0ckNRolla/Malleable-C2-Randomizer
A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
R0ckNRolla/NTLM-THEFT
R0ckNRolla/NTLMX
Post-exploitation NTLM password hash extractor
R0ckNRolla/oscp_prep
oscp notes for sept '19 test
R0ckNRolla/Pika-SignTool
Pika-SignTool
R0ckNRolla/PyRai
MIRAI botnet in python3
R0ckNRolla/qubes-vpn
Basic VPN setup for Qubes OS as well as some related tooling.
R0ckNRolla/Quickrundown
Smart overlay for Cobalt Strike PS function
R0ckNRolla/Sharp-WMIExec
R0ckNRolla/smbdoor
Windows kernel backdoor via registering a malicious SMB handler
R0ckNRolla/SVScanner
SVScanner - Scanner Vulnerability And MaSsive Exploit.
R0ckNRolla/Terminal
The new Windows Terminal, and the original Windows console host -- all in the same place!
R0ckNRolla/Terminals
Terminals is a secure, multi tab terminal services/remote desktop client. It uses Terminal Services ActiveX Client (mstscax.dll). The project started from the need of controlling multiple connections simultaneously. It is a complete replacement for the mstsc.exe (Terminal Services) client. This is official source moved from Codeplex.
R0ckNRolla/windows_pentest_tools
My pentest tools used two years ago. Part1
R0ckNRolla/zerokit
Zerokit/GAPZ rootkit (non buildable and only for researching)