Pinned Repositories
AWSome-Pentesting
My cheatsheet notes to pentest AWS infrastructure
BitM
Beagle in the Middle
BitM-1
blue-merle
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
CLRvoyance
Managed assembly shellcode generation
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
CrackMapExec
A swiss army knife for pentesting networks
CredSniper
CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
Deep-Live-Cam
real time face swap and one-click video deepfake with only a single image
empyrials's Repositories
empyrials/AWSome-Pentesting
My cheatsheet notes to pentest AWS infrastructure
empyrials/blue-merle
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
empyrials/Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
empyrials/CLRvoyance
Managed assembly shellcode generation
empyrials/Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
empyrials/CrackMapExec
A swiss army knife for pentesting networks
empyrials/Deep-Live-Cam
real time face swap and one-click video deepfake with only a single image
empyrials/eavesarp
Analyze ARP requests to identify hosts that are communicating with one another.
empyrials/edl
Inofficial Qualcomm Firehose / Sahara / Streaming / Diag Tools :)
empyrials/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
empyrials/follina.py
POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes
empyrials/ghidra
empyrials/GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
empyrials/hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
empyrials/Invoke-CommandAs
Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
empyrials/msdocs-app-service-sqldb-dotnetcore
empyrials/msdt-follina
Codebase to generate an msdt-follina payload
empyrials/octoprint-usb-autoconnect
udev hook to reconnect the serial connection of your 3D printer in OctoPrint
empyrials/OffensiveCSharp
Collection of Offensive C# Tooling
empyrials/ollama-swarm
Educational framework exploring ergonomic, lightweight multi-agent orchestration. Modified to use local Ollama endpoint
empyrials/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
empyrials/privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
empyrials/ProcessReimaging
Process reimaging proof of concept code
empyrials/random_notes
empyrials/SharpRDP
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
empyrials/simple_https_server
empyrials/SOCKS5-Proxy-Handler
Modern C++ SOCKS5 Client Handler
empyrials/solarflare
SolarWinds Orion Account Audit / Password Dumping Utility
empyrials/VSCELicense
PowerShell module to get and set Visual Studio Community Edition license expiration date in the registry
empyrials/Win10-Initial-Setup-Script
PowerShell script for automation of routine tasks done after fresh installations of Windows 10 / Server 2016 / Server 2019