Pinned Repositories
clair
Vulnerability Static Analysis for Containers
devika
Devika is an Agentic AI Software Engineer that can understand high-level human instructions, break them down into steps, research relevant information, and write code to achieve the given objective. Devika aims to be a competitive open-source alternative to Devin by Cognition AI.
Nebula
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
Presentations-and-Conferences
A list of Presentations done on Conferences
python-http-reverse-shell
Compiled Python HTTP Reverse Shell
Rodan
Rodan Exploitation Framework
rootkit.com
Mirror of users section of rootkit.com
sliver
Adversary Emulation Framework
venom
venom - C2 shellcode generator/compiler/handler
YetiHunter
Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community.
gl4ssesbo1's Repositories
gl4ssesbo1/Nebula
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
gl4ssesbo1/Presentations-and-Conferences
A list of Presentations done on Conferences
gl4ssesbo1/devika
Devika is an Agentic AI Software Engineer that can understand high-level human instructions, break them down into steps, research relevant information, and write code to achieve the given objective. Devika aims to be a competitive open-source alternative to Devin by Cognition AI.
gl4ssesbo1/YetiHunter
Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community.
gl4ssesbo1/ANGRYORCHARD
A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.
gl4ssesbo1/AWSome-Pentesting
My cheatsheet notes to pentest AWS infrastructure
gl4ssesbo1/BARK
BloodHound Attack Research Kit
gl4ssesbo1/BloodHound
Six Degrees of Domain Admin
gl4ssesbo1/BounceBack
↕️🤫 Stealth redirector for your red team operation security
gl4ssesbo1/Chaos-Rootkit
Now You See Me, Now You Don't
gl4ssesbo1/Dumpy
Reuse opened handles to dynamically dump LSASS.
gl4ssesbo1/FlavorTown
Various ways to execute shellcode
gl4ssesbo1/Flipper-IRDB
A collective of different IRs for the Flipper
gl4ssesbo1/gl4ssesbo1.github.io
My Website
gl4ssesbo1/Heroinn
A cross platform C2/post-exploitation framework.
gl4ssesbo1/Jarvis_AI
Jarvis AI is a Python Module which is able to perform task like Chatbot, Assistant etc. It provides base functionality for any assistant application. This JarvisAI is built using Tensorflow, Pytorch, Transformers and other opensource libraries and frameworks.
gl4ssesbo1/MAM
gl4ssesbo1/manjusaka
牛屎花 一款C2远控
gl4ssesbo1/Masky
Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory
gl4ssesbo1/Max
Maximizing BloodHound. Max is a good boy.
gl4ssesbo1/nimc2
a c2 fully written in nim
gl4ssesbo1/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
gl4ssesbo1/Sandman
Sandman is a NTP based backdoor for red team engagements in hardened networks.
gl4ssesbo1/ShadowSpray
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.
gl4ssesbo1/TamperingSyscalls
gl4ssesbo1/URootkit
user-mode Rootkit
gl4ssesbo1/UserModeDLL-Loader
code that will load a PE file into the process address space without using the Windows Loader
gl4ssesbo1/VehApiResolve
gl4ssesbo1/veryfied
Mark pre-Musk era Twitter actually verified accounts.
gl4ssesbo1/VolatileDataCollector