Pinned Repositories
AuthzAI
bloodhound-quickwin
Simple script to extract useful informations from the combo BloodHound + Neo4j
Certipy
Tool for Active Directory Certificate Services enumeration and abuse
cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
Cobalt-Strike
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection
Codecepticon
.NET/PowerShell/VBA Offensive Security Obfuscator
conti_locker
Conti Locker source code
CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
CVE-2023-4863
DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
healtheedom's Repositories
healtheedom/AuthzAI
healtheedom/bloodhound-quickwin
Simple script to extract useful informations from the combo BloodHound + Neo4j
healtheedom/Certipy
Tool for Active Directory Certificate Services enumeration and abuse
healtheedom/cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
healtheedom/Cobalt-Strike
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection
healtheedom/Codecepticon
.NET/PowerShell/VBA Offensive Security Obfuscator
healtheedom/conti_locker
Conti Locker source code
healtheedom/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
healtheedom/CVE-2023-4863
healtheedom/DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
healtheedom/DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
healtheedom/DownloadTest
healtheedom/DPAT
Domain Password Audit Tool for Pentesters
healtheedom/EDR-Preloader
An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer
healtheedom/evilginx2-TTPs
Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.
healtheedom/Farmer
healtheedom/Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
healtheedom/GamingServiceEoP
healtheedom/InlineExecute-Assembly
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module
healtheedom/KrbRelayUp
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
healtheedom/Mangle
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
healtheedom/MSRPC-to-ATTACK
A repository that maps commonly used attacks using MSRPC protocols to ATT&CK
healtheedom/Mythic
A collaborative, multi-platform, red teaming framework
healtheedom/ntlmrelayx.py_to_exe
healtheedom/PackMyPayload
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
healtheedom/ProtectMyTooling
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
healtheedom/random_c2_profile
Cobalt Strike random C2 Profile generator
healtheedom/Red-team-Interview-Questions
Red team Interview Questions
healtheedom/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
healtheedom/SourcePoint
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.