Pinned Repositories
abusing-jenkins-groovy
ALEAPP-ANDROID-FORENSIC
Android Logs Events And Protobuf Parser
cracking-rsa
cracking a weak rsa key and obtain n,e,p,q,d and private key with python
CVE-2022-46169-CACTI-1.2.22
This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.
file-organizer
simple file organizer with python, help to organize your files into the respective directory
picoCTF-DISK-WRITTU-UP
SeBackupPrivilege
Fastest method to exploit the SeBackupPrivilege in a windows AD or standalone machine
SeImpersonatePrivilege
How to exploit SeImpersonatePrivilege with different ways
VisualStudio-RCE-EvilSln
A New Exploitation Technique for Visual Studio Projects
made-in-tanzania-cybersec
A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts
alien-keric's Repositories
alien-keric/SeImpersonatePrivilege
How to exploit SeImpersonatePrivilege with different ways
alien-keric/SeBackupPrivilege
Fastest method to exploit the SeBackupPrivilege in a windows AD or standalone machine
alien-keric/alien-keric.github.io
About
alien-keric/made-in-tanzania
A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts
alien-keric/SHERLOCK
series of sherlock walkthrough
alien-keric/acunetix
automated vulnerability scanner and how to configure it
alien-keric/archie
A minimal Hugo Theme
alien-keric/compiled
compiled machine
alien-keric/compiled-dll
malicious compiled dll which can be use to abuse SeBackupPrivilege, The following dlls are compiled for x64, .NET Framework 2.0
alien-keric/CVE-2023-4197
this is a simple script from CVE-2023-4197 that was little bit modified since because it didn't work at first time with broadlight machine from HTB which means that we have to modify the script a little bit and then use it as how the ducumentation says
alien-keric/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
alien-keric/DLL-hijacking
hijacking Dynamic-link library, this techiniques can be use to gain persistence in a windows machine
alien-keric/dvwa_lab2
simple source code for the assigment lab 2
alien-keric/evtx_dumper
The main binary utility provided with this crate is evtx_dump, and it provides a quick way to convert .evtx files to different output formats. Some examples
alien-keric/file-upload
different file upload techniques, file upload via a web.config
alien-keric/impacket
Impacket is a collection of Python classes for working with network protocols.
alien-keric/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
alien-keric/NoSQLi
sample of NoSQLi payloads all from portswigger and hacktricks
alien-keric/notes-exams
some notes for the exams
alien-keric/opensearch
alien-keric/powershell
simple modified powershell can be used to gain access from one user to another using but it needs what is know as password
alien-keric/python-telegram-bot
We have made you a wrapper you can't refuse
alien-keric/RETIRED-HTB-MACHINES
This is a list of htb retired machines I have been doing so far
alien-keric/schema
schema
alien-keric/UDOM-CYBER-CLUB
indivual activities
alien-keric/urchinsec-ctf
scripties that i was using during the ctf to play and which were usufull for me
alien-keric/wallpaper
list of my wallpaper i use.
alien-keric/webshell
simple web shell in php
alien-keric/windows--binaries
composition of some windows binaries
alien-keric/winpeas
windows privilege escalation checklist with winpeas binary for windows