dmsmith1991's Stars
MarkR42/malenki-nano
Speed controller and receiver for small robots
Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks
A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers
Matheus-Garbelini/esp32_bluetooth_classic_sniffer
Active Bluetooth BR/EDR Sniffer/Injector as cheap as any ESP32 board can get. Works with Scapy ;-)
felis/USB_Host_Shield_2.0
Revision 2.0 of USB Host Library for Arduino.
bytecode77/self-morphing-csharp-binary
Executable that mutates its own code
two06/Inception
Provides In-memory compilation and reflective loading of C# apps for AV evasion.
dmsmith1991/AMSI_Handler
Automate AV evasion by calling AMSI
hydrabus/rhme-2016
The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition provides a completely different set of new challenges to test your skills in side channel, fault injection, cryptoanalysis and software exploitation attacks.
hydrabus/hydrafw
HydraBus HydraFW official firmware for open source multi-tool for anyone interested in learning/developping/debugging/hacking/Penetration Testing for basic or advanced embedded hardware
Keysight/Rhme-2016
Rhme2 challenge (2016)
vxunderground/VXUG-Papers
Research code & papers from members of vx-underground.
r4wd3r/RID-Hijacking
Windows RID Hijacking persistence technique
Arvanaghi/SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
byt3bl33d3r/CrackMapExec
A swiss army knife for pentesting networks
cube0x0/CVE-2021-1675
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
byt3bl33d3r/SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
byt3bl33d3r/OffensiveDLR
Toolbox containing research notes & PoC code for weaponizing .NET's DLR
danielbohannon/Invoke-Obfuscation
PowerShell Obfuscator
cobbr/ObfuscatedEmpire
ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.
cobbr/Elite
Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.
cobbr/SharpSploit
SharpSploit is a .NET post-exploitation library written in C#
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
G0ldenGunSec/SharpSecDump
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
GhostPack/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
praetorian-inc/PortBender
TCP Port Redirection Utility
nettitude/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.