Pinned Repositories
ADenum
AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
DeathStar
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
gh0stGM.github.io
Build a Jekyll blog in minutes, without touching the command line.
hackaday-u
Course materials for hackaday.io Ghidra training
muraena
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
pentest-notes
RedTeamCSharpScripts
C# Script used for Red Team
Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.
gh0stGM's Repositories
gh0stGM/ADenum
AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
gh0stGM/Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
gh0stGM/DeathStar
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
gh0stGM/gh0stGM.github.io
Build a Jekyll blog in minutes, without touching the command line.
gh0stGM/hackaday-u
Course materials for hackaday.io Ghidra training
gh0stGM/muraena
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
gh0stGM/pentest-notes
gh0stGM/RedTeamCSharpScripts
C# Script used for Red Team
gh0stGM/Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.