Pinned Repositories
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
caddy
Fast, cross-platform HTTP/2 web server with automatic HTTPS
Cheat-Sheets
Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)
Cheatsheet-God
Penetration Testing / OSCP Biggest Reference Bank
CodeExecutionOnWindows
A list of ways to execute code on Windows using legitimate Windows tools
ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
CredDefense
Credential and Red Teaming Defense for Windows Environments
aarandomhacker's Repositories
aarandomhacker/Advanced-Process-Injection-Workshop
aarandomhacker/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
aarandomhacker/AmsiBypass-OpenSession
This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file
aarandomhacker/AmsiBypassHookManagedAPI
A new AMSI Bypass technique using .NET ALI Call Hooking.
aarandomhacker/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
aarandomhacker/BOFs
Collection of Beacon Object Files
aarandomhacker/byob
An open-source post-exploitation framework for students, researchers and developers.
aarandomhacker/C2concealer
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
aarandomhacker/Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
aarandomhacker/Cybersecurity-Resources
A Library of various cybersecurity resources
aarandomhacker/ferret
Declarative web scraping
aarandomhacker/GitGot
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
aarandomhacker/GOAD
game of active directory
aarandomhacker/iam-vulnerable
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.
aarandomhacker/Ivy
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
aarandomhacker/lyncsmash
locate and attack Lync/Skype for Business
aarandomhacker/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
aarandomhacker/MFASweep
A tool for checking if MFA is enabled on multiple Microsoft Services
aarandomhacker/NtHiM
Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!
aarandomhacker/PassTheCert
Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel
aarandomhacker/PELoader
PE loader with various shellcode injection techniques
aarandomhacker/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
aarandomhacker/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
aarandomhacker/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
aarandomhacker/SOAPHound
SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.
aarandomhacker/subjack
Subdomain Takeover tool written in Go
aarandomhacker/SysWhispers
AV/EDR evasion via direct system calls.
aarandomhacker/UltimateWDACBypassList
A centralized resource for previously documented WDAC bypass techniques
aarandomhacker/velociraptor
Digging Deeper....
aarandomhacker/WFH