m0nk336's Stars
0xStarlight/CRTP-Notes
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
bdamele/icmpsh
Simple reverse ICMP shell
s0md3v/Photon
Incredibly fast crawler designed for OSINT.
outflanknl/Dumpert
LSASS memory dumper using direct system calls and API unhooking.
ShutdownRepo/ShadowCoerce
MS-FSRVP coercion abuse PoC
gtworek/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
EvanMcBroom/lsa-whisperer
Tools for interacting with authentication packages using their individual message protocols
jthuraisamy/SysWhispers
AV/EDR evasion via direct system calls.
MzHmO/SymProcAddress
Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)
klezVirus/SilentMoonwalk
PoC Implementation of a fully dynamic call stack spoofer
Helixo32/CrimsonEDR
Simulate the behavior of AV/EDR for malware development training.
tastypepperoni/PPLBlade
Protected Process Dumper Tool
login-securite/DonPAPI
Dumping DPAPI credz remotely
lkarlslund/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
WithSecureLabs/CallStackSpoofer
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
susMdT/LoudSunRun
Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction
gabriellandau/PPLFault
pard0p/CallstackSpoofingPOC
C++ self-Injecting dropper based on various EDR evasion techniques.
bats3c/ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
Mr-Un1k0d3r/SCShell
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
xenoscr/manual-syscall-detect
A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.
jackullrich/syscall-detect
PoC capable of detecting manual syscalls from usermode.
n0mi1k/pmkidcracker
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
Mr-Robert0/Logsensor
A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning
BC-SECURITY/Moriarty
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
GetRektBoy724/SyscallShuffler
Your NTDLL vaccine from modern direct syscall methods.
ticarpi/jwt_tool
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
dirkjanm/BloodHound.py
A Python based ingestor for BloodHound
dremin/RetroBar
Classic Windows 95, 98, Me, 2000, XP, Vista taskbar for modern versions of Windows