py7hagoras's Stars
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
s0md3v/Arjun
HTTP parameter discovery suite.
its-a-feature/Mythic
A collaborative, multi-platform, red teaming framework
MaartenBaert/ssr
SimpleScreenRecorder, a screen recorder for Linux
SnaffCon/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
samyk/slipstream
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
tenable/poc
Proof of Concepts
dirkjanm/CVE-2020-1472
PoC for Zerologon - all research credits go to Tom Tervoort of Secura
FuzzySecurity/Sharp-Suite
Also known by Microsoft as Knifecoat :hot_pepper:
djhohnstein/SharpWeb
.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.
b4rtik/ATPMiniDump
Evading WinDefender ATP credential-theft
xforcered/StandIn
StandIn is a small .NET35/45 AD post-exploitation toolkit
BinaryScary/NET-Obfuscate
Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
BC-SECURITY/Invoke-ZeroLogon
Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.
pkb1s/SharpAllowedToAct
Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)
WithSecureLabs/ppid-spoofing
Scripts for performing and detecting parent PID spoofing
mez-0/MoveScheduler
.NET 4.0 Scheduled Job Lateral Movement
rasta-mouse/GadgetToJScript
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
cowriesys/stellarator
Cowrie exchange API for converting between fiat currencies and crypto currencies
py7hagoras/OfficeMacro64
This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/
rvrsh3ll/KeyTabExtract
Extracts Key Values from .keytab files