Pinned Repositories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Awesome-CobaltStrike
cobaltstrike的相关资源汇总 / A collection of cobaltstrike resources to make you better!
Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
exploitation-course
Offensive Software Exploitation Course
MyPasswords
A simple and secure password manager i created for my software engineering class.
PatternAnalyzer
The purpose of this application is to analyze and create statistics of repetitive lock patterns that everyday users create and use. This project was created for the "security of wireless and mobile network communications" class of 2019. ICSD Department of University of Aegean.
TokenPlayer
Manipulating and Abusing Windows Access Tokens.
WinPwn
Automation for internal Windows Penetrationtest / AD-Security
S1ckB0y1337's Repositories
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
S1ckB0y1337/Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
S1ckB0y1337/TokenPlayer
Manipulating and Abusing Windows Access Tokens.
S1ckB0y1337/PatternAnalyzer
The purpose of this application is to analyze and create statistics of repetitive lock patterns that everyday users create and use. This project was created for the "security of wireless and mobile network communications" class of 2019. ICSD Department of University of Aegean.
S1ckB0y1337/MyPasswords
A simple and secure password manager i created for my software engineering class.
S1ckB0y1337/exploitation-course
Offensive Software Exploitation Course
S1ckB0y1337/Awesome-CobaltStrike
cobaltstrike的相关资源汇总 / A collection of cobaltstrike resources to make you better!
S1ckB0y1337/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
S1ckB0y1337/WindowsExploitationResources
Some random resources for certain topics of exploit development for Windows and semi-related topics
S1ckB0y1337/BetterSafetyKatz
BetterSafetyKatz
S1ckB0y1337/exploit
S1ckB0y1337/FALCONSTRIKE
A stealthy, targeted Windows Loader for delivering second-stage payloads(shellcode) from Github to the host machine undetected
S1ckB0y1337/ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
S1ckB0y1337/S1ckB0y1337.github.io
Personal InfoSec Blog
S1ckB0y1337/ssl_cheat_sheet
S1ckB0y1337/Stormspotter
Azure Red Team tool for graphing Azure and Azure Active Directory objects
S1ckB0y1337/upx
UPX - the Ultimate Packer for eXecutables
S1ckB0y1337/UsoDllLoader
Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
S1ckB0y1337/winchecksec
Checksec, but for Windows: static detection of security mitigations in executables
S1ckB0y1337/CheekyBlinder
Enumerating and removing kernel callbacks using signed vulnerable drivers
S1ckB0y1337/eBook-BypassingAVsByCSharp
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
S1ckB0y1337/ExploitCapcom
This is a standalone exploit for a vulnerable feature in Capcom.sys
S1ckB0y1337/frp
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
S1ckB0y1337/HUNT
S1ckB0y1337/Invoke-PrintDemon
S1ckB0y1337/Kage
Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
S1ckB0y1337/PowerToys
Windows system utilities to maximize productivity
S1ckB0y1337/practical-python
Practical Python Programming (course by @dabeaz)
S1ckB0y1337/UrbanBishopLocal
S1ckB0y1337/win32
Public mirror for win32-pr