Pinned Repositories
Active-Directory
Collection of scripts for Querying and Managing Active Directory and Domain Controllers
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
adPEAS
Powershell tool to automate Active Directory enumeration.
Alaris
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
CARTP-Scripts
Random scripts that I used in the CARTP course lab & final exam.
evasion
AV EVASION TECHNIQUES
init5-SF's Repositories
init5-SF/CARTP-Scripts
Random scripts that I used in the CARTP course lab & final exam.
init5-SF/evasion
AV EVASION TECHNIQUES
init5-SF/AzureRT
AzureRT - A Powershell module implementing various Azure Red Team tactics
init5-SF/CARTP-cheatsheet
Azure AD cheatsheet for the CARTP course
init5-SF/chameleon
PowerShell Script Obfuscator
init5-SF/Course-Piracy-Index
Course Piracy Index 🏴☠️
init5-SF/Creds
Some usefull Scripts and Executables for Pentest & Forensics
init5-SF/Encrypt-Delete-Test
Really can protect from ransomware encryption?
init5-SF/ExtractedDefender
init5-SF/GOAD
game of active directory
init5-SF/Group3r
Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
init5-SF/hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and other AV solutions, solely based on http(s) traffic.
init5-SF/InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
init5-SF/Invoke-Mimikatz
Powershell Mimikatz Loader
init5-SF/maldev-for-dummies
A workshop about Malware Development
init5-SF/MSSqlPwner
init5-SF/Payload-Download-Cradles
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
init5-SF/Pentest-Tools-Collection
init5-SF/pentesting-azure-ad
A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.
init5-SF/powerview.py
PowerView alternative
init5-SF/PowerZure
PowerShell framework to assess Azure security
init5-SF/Practice-AD-CS-Domain-Escalation
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
init5-SF/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
init5-SF/RedTeaming_CheatSheet
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
init5-SF/sclauncher
A small program written in C that is designed to load 32-bit shellcode and allow for execution or debugging.
init5-SF/sharem
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
init5-SF/SharpADWS
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
init5-SF/SharpEfsPotato
Local privilege escalation from SeImpersonatePrivilege using EfsRpc.
init5-SF/UltimateWDACBypassList
A centralized resource for previously documented WDAC bypass techniques
init5-SF/Vol-GUI
A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.