Pinned Repositories
AMS-BP
AMSI Bypass for powershell
AMSI_patch
Patching AmsiOpenSession by forcing an error branching
ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
CredNinja
A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter
crimson
Web Application Security Testing Tools
DInjector
Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL
EmailGenerator
Python script to generate email addresses from names and the domain
encrypt
Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.
evasion
AV EVASION TECHNIQUES
kardal8's Repositories
kardal8/AMS-BP
AMSI Bypass for powershell
kardal8/AMSI_patch
Patching AmsiOpenSession by forcing an error branching
kardal8/ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
kardal8/CredNinja
A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter
kardal8/crimson
Web Application Security Testing Tools
kardal8/DInjector
Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL
kardal8/EmailGenerator
Python script to generate email addresses from names and the domain
kardal8/encrypt
Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.
kardal8/evasion
AV EVASION TECHNIQUES
kardal8/GOBS
kardal8/Pachine
Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
kardal8/PetitPotam
Python implementation for PetitPotam
kardal8/PPN
Pentester's Promiscuous Notebook
kardal8/Pure-Malware-Development
Pure Malware Development Resource Collections
kardal8/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
kardal8/Suborner
kardal8/SuperDllHijack
SuperDllHijack:A general DLL hijack technology, don't need to manually export the same function interface of the DLL, so easy! 一种通用Dll劫持技术,不再需要手工导出Dll的函数接口了
kardal8/Taskschedule-Persistence-Download-Cradles
Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged