Pinned Repositories
adPEAS
Powershell tool to automate Active Directory enumeration.
APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
bootkit-samples
Bootkit sample for firmware attack
byeintegrity-uac
Bypass UAC by hijacking a DLL located in the Native Image Cache
byte_stinker
A PoC PE dumper designed to pull (potentially malicious) extra binaries stored in programs.
firmware-security-training
Katana-1
A Python Tool For google Hacking
lsarelayx
NTLM relaying for Windows made easy
MalwareDefenceScanner
MalwareDefenceScanner
PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
jack51706's Repositories
jack51706/lsarelayx
NTLM relaying for Windows made easy
jack51706/bootkit-samples
Bootkit sample for firmware attack
jack51706/herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
jack51706/TartarusGate
TartarusGate, Bypassing EDRs
jack51706/ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
jack51706/AntiAntiVirusNotes
学习免杀的笔记
jack51706/Black-Angel-Rootkit
Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
jack51706/BlackLotus
BlackLotus UEFI Windows Bootkit
jack51706/bloodyAD
BloodyAD is an Active Directory Privilege Escalation Framework
jack51706/code2flow
Pretty good call graphs for dynamic languages
jack51706/ddddocr
带带弟弟 通用验证码识别OCR pypi版
jack51706/DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
jack51706/elevationstation
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
jack51706/Go_Bypass
Golang Bypass Av Generator template
jack51706/GoMapEnum
User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin
jack51706/I-S00N
jack51706/Ivy
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
jack51706/Medusa-2
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
jack51706/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
jack51706/My-Security-Resources
My note about Cyber Security, in Chinese, English or Meow language
jack51706/OffensiveAutoIt
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
jack51706/RealChar
🎙️🤖Create, Customize and Talk to your AI Character/Companion in Realtime (All in One Codebase!). Have a natural seamless conversation with AI everywhere (mobile, web and terminal) using LLM OpenAI GPT3.5/4, Anthropic Claude2, Chroma Vector DB, Whisper Speech2Text, ElevenLabs Text2Speech🎙️🤖
jack51706/RedTeamNotes
红队技术笔记
jack51706/rpcfirewall
jack51706/SecOpsDev
自己闲来无事所写以及工作中抽取的安全/运维/开发方面的小脚本
jack51706/shennina
Automating Host Exploitation with AI
jack51706/SMBSR
Lookup for interesting stuff in SMB shares
jack51706/Spray365
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
jack51706/vmprotect-3.5.1
jack51706/VMProtect-Source
Source of VMProtect (NOT OFFICIALLY)