darksh3llRU's Stars
trufflesecurity/trufflehog
Find, verify, and analyze leaked credentials
Tsuyoken/ImgBackdoor
Hide your payload into .jpg file
trustedsec/CS-Remote-OPs-BOF
trustedsec/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
deepinstinct/Dirty-Vanity
A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass-28417
BeichenDream/PrintNotifyPotato
PrintNotifyPotato
CCob/Volumiser
testanull/ProxyNotShell-PoC
d4t4s3c/OffensiveReverseShellCheatSheet
Collection of reverse shells for red team operations.
Wh04m1001/MSIExecEoP
Arbitrary File Delete in Windows Installer before 10.0.19045.2193
gloxec/CrossC2
generate CobaltStrike's cross-platform payload
icyguider/MoreImpacketExamples
More examples using the Impacket library designed for learning purposes.
Cloud-Architekt/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
d3lb3/KeeFarceReborn
A standalone DLL that exports databases in cleartext once injected in the KeePass process.
fortalice/modifyCertTemplate
ADCS cert template modification and ACL enumeration
JamesCooteUK/SharpSphere
.NET Project for Attacking vCenter
wddadk/Phishing-campaigns
lothos612/shodan
Shodan Dorks
Mr-Un1k0d3r/ATP-PowerShell-Scripts
Microsoft Signed PowerShell scripts
bugch3ck/SharpEfsPotato
Local privilege escalation from SeImpersonatePrivilege using EfsRpc.
horizon3ai/CVE-2022-40684
A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
mandiant/ADFSpoof
casterbyte/Above
Invisible network protocol sniffer
hackerhouse-opensource/NoFaxGiven
Code Execution & Persistence in NETWORK SERVICE FAX Service
p0dalirius/MSSQL-Analysis-Coerce
A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.
layer8secure/SilentHound
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.
CravateRouge/autobloody
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
med0x2e/NTLMRelay2Self
An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).
hackerhouse-opensource/ColorDataProxyUACBypass
Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass. Win 7 & up.