flowwang's Stars
koutto/pi-pwnbox-rogueap
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
unjs/untun
🚇 Tunnel your local HTTP(s) server to the world! powered by Cloudflare Quick Tunnels.
bitsadmin/nopowershell
PowerShell rebuilt in C# for Red Teaming purposes
7etsuo/windows-api-function-cheatsheets
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
b1tg/CVE-2023-38831-winrar-exploit
CVE-2023-38831 winrar exploit generator
Dec0ne/DllNotificationInjection
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
p0dalirius/LDAPWordlistHarvester
A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.
p1d3er/RemoteWebScreen
本项目是一个远程控制应用,使用 Golang 开发,允许用户通过 Web 界面远程控制和屏幕监控其他计算机。主要功能包括屏幕共享、鼠标和键盘控制以及键盘记录。
Ridter/atexec-pro
Fileless atexec, no more need for port 445
mandiant/STrace
A DTrace on Windows Reimplementation
lypd0/DeadPotato
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
Maldev-Academy/MaldevAcademyLdr.1
Mr-Un1k0d3r/.NetConfigLoader
.net config loader
deepinstinct/NoFilter
ba0gu0/wps-rce
WPS Office RCE On 2023-08-10
mertdas/RedPersist
decoder-it/TokenStealer
synacktiv/SCCMSecrets
SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.
ad0nis/ntlm_relay_gat
mistymntncop/CVE-2023-3079
mlcsec/proctools
Small toolkit for extracting information and dumping sensitive strings from Windows processes
noperator/chromedb
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
govindasamyarun/c2-cloud
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
jonhoo/udp-over-tcp
A command-line tool for tunneling UDP datagrams over TCP.
gavz/ExplorerPersist
Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius code get executed
ill5-com/fortinet-ssl-vpn-bruteforce
Bruteforces Fortinet SSL VPNs
knqyf263/CVE-2023-50387
KeyTrap (DNSSEC)
0x7eTeam/CVE-2023-26256
CVE-2023-26255_POC,CVE-2023-26256_POC
redskal/malrdp-deploy
Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible
Aterror2be/CVE-2020-14974
A simple POC that demonstrates A vulnerability found in IObitUnlocker 1.1.2 that leverages IOCTL codes found it its vulnerable driver (IObitUnlocker.sys), providing ability to unlock, delete, rename, copy, and move running files and a low privileged user.