ice-wzl
// On a quest for knowledge \\ *Anything is Open Source if you try hard enough*
SANS Institute Pluto
Pinned Repositories
bash-malware-dropper
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
basicRAT
boilerplate python rat
DataReaper
DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shodan search with web scraping techniques to efficiently gather information from targeted websites.
Fuel-1.4.1-RCE-Updated
Hacknetics
Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
post-exploitation
RouterOS-SMB-DOS-POC
This repository contains a working POC for a Denial of Service condition bug that is found on the SMB service for RouterOS devices.
Tor-Bot
Python web bot that uses Selenium to view web pages and mimic a human reader. This bot will route its traffic through Tor.
windows-host-enumeration
PowerShell Script to enumerate a Windows host and detect potential malware, characterize the system, and learn about key configurations.
wmiexec2
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
ice-wzl's Repositories
ice-wzl/Hacknetics
Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
ice-wzl/wmiexec2
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
ice-wzl/bash-malware-dropper
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
ice-wzl/DataReaper
DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shodan search with web scraping techniques to efficiently gather information from targeted websites.
ice-wzl/Fuel-1.4.1-RCE-Updated
ice-wzl/Tor-Bot
Python web bot that uses Selenium to view web pages and mimic a human reader. This bot will route its traffic through Tor.
ice-wzl/post-exploitation
ice-wzl/windows-host-enumeration
PowerShell Script to enumerate a Windows host and detect potential malware, characterize the system, and learn about key configurations.
ice-wzl/RouterOS-SMB-DOS-POC
This repository contains a working POC for a Denial of Service condition bug that is found on the SMB service for RouterOS devices.
ice-wzl/basicRAT
boilerplate python rat
ice-wzl/ice-wzl
Config files for my GitHub profile.
ice-wzl/python-projects
ice-wzl/cpp_projects
My respository for various small projects as I learn C++
ice-wzl/504vsa
504 VSAgent
ice-wzl/Attack_Infra_Setup
ice-wzl/coding-interview-university
A complete computer science study plan to become a software engineer.
ice-wzl/Disable-Windows-Defender-
Disable Windows Defender (+ UAC Bypass, + Upgrade to SYSTEM)
ice-wzl/FFM
Freedom Fighting Mode: open source hacking harness
ice-wzl/freedomfighting
A collection of scripts which may come in handy during your freedom fighting activities.
ice-wzl/inumaki
🚩🐺 shell generator for CTFs!
ice-wzl/level-up-python-3210418
This is a LinkedIn Learning repo for Level Up: Python.
ice-wzl/Periscope
ice-wzl/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing