Pinned Repositories
aliaz
Dynamic Filesystem and Command Aliassing
AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
Amsi-Killer
Lifetime AMSI bypass
awesome-edr-bypass
Awesome EDR Bypass Resources For Ethical Hacking
detector
Free Open Source IDS via Shellscripts, connecting Binaries
extract0r
Python 3 http.server with TLS
Honeypot-Attack-Simulator
Automatically Run Enumeration, Bruteforces and Exploits Against Random IPs
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
RustGPT
GPT via Rust Reqwest API
UnhookingPatch
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
pdolinic's Repositories
pdolinic/ANTfs
pdolinic/check_prometheus_metric
Nagios plugin for alerting on Prometheus query results.
pdolinic/DetectWindowsCopyOnWriteForAPI
Enumerate various traits from Windows processes as an aid to threat hunting
pdolinic/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
pdolinic/icingaweb2-module-director
The Director aims to be your new favourite Icinga config deployment tool. Director is designed for those who want to automate their configuration deployment and those who want to grant their “point & click” users easy access to the configuration.
pdolinic/icmpdoor
ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
pdolinic/invoke-lsaparse
PowerShell implemtation for parsing LSA (Local Security Authority) process memory dumps
pdolinic/kasld
[ KASLD ] Kernel Address Space Layout Derandomization - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
pdolinic/koadic
zerosum0x0's Koadic
pdolinic/Linux-Privilege-Escalation
This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples.
pdolinic/lnkbomb
Malicious shortcut generator for collecting NTLM hashes from insecure file shares.
pdolinic/Mind-Maps
Mind-Maps of Several Things
pdolinic/mysql-logstash-pipeline
Logstash pipeline for parsing MySQL/MariaDB logs
pdolinic/Mystikal
macOS Initial Access Payload Generator
pdolinic/nginxpwner
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.
pdolinic/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
pdolinic/nosferatu
Windows NTLM Authentication Backdoor
pdolinic/offensive-docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
pdolinic/OffensiveVBA
This repo covers some code execution and AV Evasion methods for Macros in Office documents
pdolinic/overlord
Overlord - Red Teaming Infrastructure Automation
pdolinic/Peruns-Fart
Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.
pdolinic/RecycledGate
Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll
pdolinic/secure-logstash-pipeline
logstash pipeline for secure log
pdolinic/sudo-logstash-pipeline
pdolinic/threat-tools
Tools for simulating threats
pdolinic/twint
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
pdolinic/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
pdolinic/username-anarchy
Username tools for penetration testing
pdolinic/Vulnerable-Code-Snippets
A small collection of vulnerable code snippets
pdolinic/WatchAD
AD Security Intrusion Detection System