Pinned Repositories
AMSI-Provider
A fake AMSI Provider which can be used for persistence.
CheatSheets
Commands to perform various activities related to penetration testing and red teaming
Checklists
Red Teaming & Pentesting checklists for various engagements
Default-Credentials
Default usernames and passwords for various systems (VoIP,IPMI,Oracle).
Digital-Signature-Hijack
Binaries, PowerShell scripts and information about Digital Signature Hijacking.
GhostLoader
GhostLoader - AppDomainManager - Injection - 攻壳机动队
Pentest-Bookmarks
Database of websites for penetration testing
netbiosX's Repositories
netbiosX/Checklists
Red Teaming & Pentesting checklists for various engagements
netbiosX/Default-Credentials
Default usernames and passwords for various systems (VoIP,IPMI,Oracle).
netbiosX/Digital-Signature-Hijack
Binaries, PowerShell scripts and information about Digital Signature Hijacking.
netbiosX/Pentest-Bookmarks
Database of websites for penetration testing
netbiosX/AMSI-Provider
A fake AMSI Provider which can be used for persistence.
netbiosX/GhostLoader
GhostLoader - AppDomainManager - Injection - 攻壳机动队
netbiosX/CheatSheets
Commands to perform various activities related to penetration testing and red teaming
netbiosX/iPurpleTeam
Frameworks, Methodologies, Detection Rules and Tooling for establishing a Purple Team program.
netbiosX/Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
netbiosX/Red-Team-CheatSheets
The website version of CheatSheets
netbiosX/ApplicationWhitelistBypassTechniques
A Catalog of Application Whitelisting Bypass Techniques
netbiosX/Credential-Dumping
This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the same tasks
netbiosX/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
netbiosX/Shellcode-Via-HTA
How To Execute Shellcode via HTA
netbiosX/subTee-gits-backups
subTee gists code backups
netbiosX/Aggressor-scripts
Aggressor scripts I've made for Cobalt Strike
netbiosX/lazykatz
Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software.
netbiosX/netbiosX
Config files for my GitHub profile.
netbiosX/Checklists-Website
The website version for checklists project
netbiosX/DotNetToJScript
A tool to create a JScript file which loads a .NET v2 assembly from memory.
netbiosX/hackerEnv
netbiosX/Misc-PowerShell-Stuff
random powershell goodness
netbiosX/nishang
Nishang - PowerShell for penetration testing and offensive security.
netbiosX/RegistrationFreeCOM
Inject DLL Prototype using Microsoft.Windows.ACTCTX COM Object
netbiosX/Sim
C# User Simulation
netbiosX/windows-operating-system-archaeology
windows-operating-system-archaeology @Enigma0x3 @subTee
netbiosX/kernelpop
kernel privilege escalation enumeration and exploitation framework
netbiosX/sigma
Generic Signature Format for SIEM Systems
netbiosX/TakeMyRDP
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
netbiosX/temp