Pinned Repositories
badurl
Part of BadURL Killer Project aim to protect user from access malicious website
Cloud-One-Network-Security-Demo
Demo environment for Trend Micro: Cloud One Network Security
Code-Execution-and-Process-Injection
Powershell to CodeExecution and ProcessInjection
CVE-2018-11776-Python-PoC
Working Python test and PoC for CVE-2018-11776, includes Docker lab
CVE-2019-0708
Scanner PoC for CVE-2019-0708 RDP RCE vuln
cve_2019_0708_bluekeep_rce
bluekeep exploit
Deep-Security-Application-Protection-Global-Rules
Uses the Deep Security SDK to create Application Control global rules
EfsPotato
Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
SMBGhost
Scanner for CVE-2020-0796 - SMBv3 RCE
tm-misp
[Due to Trend Micro release official MISP integration, this project will decide to sustain mode] TM-MISP project was created to joint Trend Micro CTD with MISP platform which will serve as bridge to synchronize IOC object from MISP to Trend Micro Apex Central (i.e. SHA-1 hash, URL, IP or Domain) and Deep Security/Cloud One Workload Security (i.e. SHA256). It can also synchronize virtual analyzer suspicious object back to MISP platform via CSV feed (SHA-1, SHA256, URL, IP and Domain)
chackco's Repositories
chackco/tm-misp
[Due to Trend Micro release official MISP integration, this project will decide to sustain mode] TM-MISP project was created to joint Trend Micro CTD with MISP platform which will serve as bridge to synchronize IOC object from MISP to Trend Micro Apex Central (i.e. SHA-1 hash, URL, IP or Domain) and Deep Security/Cloud One Workload Security (i.e. SHA256). It can also synchronize virtual analyzer suspicious object back to MISP platform via CSV feed (SHA-1, SHA256, URL, IP and Domain)
chackco/cve_2019_0708_bluekeep_rce
bluekeep exploit
chackco/Deep-Security-Application-Protection-Global-Rules
Uses the Deep Security SDK to create Application Control global rules
chackco/EfsPotato
Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
chackco/SMBGhost
Scanner for CVE-2020-0796 - SMBv3 RCE
chackco/badurl
Part of BadURL Killer Project aim to protect user from access malicious website
chackco/Cloud-One-Network-Security-Demo
Demo environment for Trend Micro: Cloud One Network Security
chackco/CVE-2018-11776-Python-PoC
Working Python test and PoC for CVE-2018-11776, includes Docker lab
chackco/CVE-2019-0708
Scanner PoC for CVE-2019-0708 RDP RCE vuln
chackco/CVE-2019-0841
PoC code for CVE-2019-0841 Privilege Escalation vulnerability
chackco/cve-2020-0601
PoC for CVE-2020-0601
chackco/CVE-2020-1472
Test tool for CVE-2020-1472
chackco/CVE-2020-1473
Exploit Code for CVE-2020-1472 aka Zerologon
chackco/CVE-2021-31166
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
chackco/CVE-2021-36934
C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
chackco/CVE-2021-41773
Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773
chackco/goodurl
Part of BadURL Killer Project aim to protect user from access malicious website
chackco/itachi-apt-sample
Generate Samples To Showcase Sandbox Technology
chackco/java-goof
chackco/log4jpwn
log4j rce test environment and poc
chackco/log4shell
Operational information regarding the vulnerability in the Log4j logging library.
chackco/Loki.Rat
Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remote Access Tool.
chackco/malwarescarecrow
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
chackco/pac
chackco/poc
chackco/PowerSharpPack
chackco/PrintNotifyPotato
PrintNotifyPotato
chackco/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
chackco/Windows_LPE_AFD_CVE-2023-21768
LPE exploit for CVE-2023-21768
chackco/zerologon
Exploit for zerologon cve-2020-1472