nikhilnayak98's Stars
jesseduffield/lazydocker
The lazier way to manage everything docker
TH3xACE/SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
BankSecurity/Red_Team
Some scripts useful for red team activities
Yaxser/Backstab
A tool to kill antimalware protected processes
MichaelKoczwara/Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
arthepsy/CVE-2021-4034
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
mgeeky/ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
mgeeky/cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
calebstewart/CVE-2021-1675
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
mgeeky/ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
1N3/PrivEsc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
rsmudge/ElevateKit
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
siliconcompiler/siliconcompiler
Modular hardware build system
leoloobeek/LAPSToolkit
Tool to audit and attack LAPS environments
frizb/Windows-Privilege-Escalation
Windows Privilege Escalation Techniques and Scripts
hasherezade/demos
Demos of various injection techniques found in malware
bats3c/darkarmour
Windows AV Evasion
ethereal-vx/Antivirus-Artifacts
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
hasherezade/transacted_hollowing
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
tobor88/PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use in an engagement
Und3rf10w/Aggressor-scripts
Aggressor scripts I've made for Cobalt Strike
CheckPointSW/Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
padovah4ck/CVE-2020-0683
CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege
hasherezade/module_overloading
A more stealthy variant of "DLL hollowing"
hlldz/CVE-2021-1675-LPE
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
ohmtech-rdi/eurorack-blocks
Software to Hardware Prototyping for Eurorack using C++, Max/Gen~ or Faust
boku7/HOLLOW
EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode
ORCA666/EVA2
Another version of EVA using anti-debugging techs && using Syscalls
outflanknl/WdToggle
A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.
returnvar/wce
Windows Credentials Editor v1.3beta