Pinned Repositories
Awesome_Malware_Techniques
This is a repository of resource about Malware techniques
brawl-public-game-001
Data from a BRAWL Automated Adversary Emulation Exercise
content
Demisto's ever-growing Content Repository
DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
experiments
Expriments
german-owasp-day
German OWASP Day conference site & presentation archive
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
HandleKatz
PIC lsass dumper using cloned handles
HardHatC2
A c# Command & Control framework
OWASP_ISO27k1Mapping
puQy's Repositories
puQy/OWASP_ISO27k1Mapping
puQy/Awesome_Malware_Techniques
This is a repository of resource about Malware techniques
puQy/brawl-public-game-001
Data from a BRAWL Automated Adversary Emulation Exercise
puQy/content
Demisto's ever-growing Content Repository
puQy/DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
puQy/experiments
Expriments
puQy/german-owasp-day
German OWASP Day conference site & presentation archive
puQy/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
puQy/HandleKatz
PIC lsass dumper using cloned handles
puQy/HardHatC2
A c# Command & Control framework
puQy/HeapCrypt
Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap
puQy/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
puQy/Hunt-Sleeping-Beacons
Aims to identify sleeping beacons
puQy/Microsoft-Extractor-Suite
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
puQy/modern-cpp-tutorial
📚 Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
puQy/OSCE
Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification
puQy/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
puQy/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
puQy/Proxy-Attackchain
proxylogon & proxyshell & proxyoracle & proxytoken & all exchange server vulns summarization :)
puQy/pythonScripting
puQy/rogue
A barebones template of 'rogue' aka a simple recon and agent deployment I built to communicate over ICMP. Well, without the ICMP code.
puQy/Shellcode-Hide
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
puQy/sliver
Adversary Emulation Framework
puQy/spectre
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
puQy/SysWhispers3
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
puQy/titanldr-ng
A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge years ago.
puQy/TLS-poison
puQy/Web-Attack-Cheat-Sheet
Web Attack Cheat Sheet
puQy/windows-exploitation
My notes while studying Windows exploitation
puQy/WindowsExploitationResources
Resources for Windows exploit development