Pinned Repositories
aws-cloudsaga
AWS CloudSaga - Simulate security events in AWS
OSED-1
osed-scripts
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
PPLKiller
Tool to bypass LSA Protection (aka Protected Process Light)
Ropper
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
mlcloudsec's Repositories
mlcloudsec/aws-cloudsaga
AWS CloudSaga - Simulate security events in AWS
mlcloudsec/OSED-1
mlcloudsec/osed-scripts
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
mlcloudsec/Ropper
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
mlcloudsec/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
mlcloudsec/AdversaryEmulation
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
mlcloudsec/bf-aws-permissions
mlcloudsec/bifrost
Objective-C library and console to interact with Heimdal APIs for macOS Kerberos
mlcloudsec/Cloudtrail2IAM
mlcloudsec/code_caver
Python based WinDbg script to automate the search for code caves in binaries and libraries.
mlcloudsec/derf
DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
mlcloudsec/dev-environment-files
mlcloudsec/docker-mitm
mlcloudsec/facebook-py-sdk
Facebook Python SDK
mlcloudsec/hashcat-rule
Rule for hashcat or john. Aiming to crack how people generate their password
mlcloudsec/HealthInspector
JXA situational awareness helper by simply reading specific files on a filesystem
mlcloudsec/hi_my_name_is_keyboard
mlcloudsec/LOOBins
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.
mlcloudsec/macOS-Exploit-Dev-OSMR
Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.
mlcloudsec/macOSTools
macOS Offensive Tools
mlcloudsec/Mystikal
macOS Initial Access Payload Generator
mlcloudsec/Orchard
JavaScript for Automation (JXA) tool to do Active Directory enumeration.
mlcloudsec/OSINT
Collections of tools and methods created to aid in OSINT collection
mlcloudsec/passphrase-wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
mlcloudsec/PersistentJXA
Collection of macOS persistence methods and miscellaneous tools in JXA
mlcloudsec/PWA-Phishing
mlcloudsec/rta-engagement-25
Demo repo
mlcloudsec/SFR-lambda-data-processing
AWS IoT Challenge 2017 - SFR Anomaly detection and notifications
mlcloudsec/Spoofy
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
mlcloudsec/tfstate2IAM