Pinned Repositories
aquatone
A Tool for Domain Flyovers
Atlas
Quick SQLMap Tamper Suggester
BeRoot
Windows Privilege Escalation Tool
BlueKeep
Proof of concept for CVE-2019-0708
bluekeep_CVE-2019-0708_poc_to_exploit
Porting BlueKeep PoC from @Ekultek to actual exploits
CVE-2017-10271
Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)
CVE-2017-11882
CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882
CVE-2018-0802
PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
EasySystem
Quick and dirty System (Power)Shell using NamedPipe impersonation.
r00t-Taurus's Repositories
r00t-Taurus/aquatone
A Tool for Domain Flyovers
r00t-Taurus/Atlas
Quick SQLMap Tamper Suggester
r00t-Taurus/BlueKeep
Proof of concept for CVE-2019-0708
r00t-Taurus/bluekeep_CVE-2019-0708_poc_to_exploit
Porting BlueKeep PoC from @Ekultek to actual exploits
r00t-Taurus/CVE-2017-10271
Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)
r00t-Taurus/CVE-2018-0802
PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
r00t-Taurus/EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
r00t-Taurus/EvilURL
Generate unicode evil domains for IDN Homograph Attack and detect them.
r00t-Taurus/flskinner
A tool to apply basic skins to FL Studio 12+ without piracy or dll replacements.
r00t-Taurus/Google-Search-API
Python based api for searching google web, images, calc, and currency conversion.
r00t-Taurus/hideproc-lkm
Linux 4.9 Loadable Kernel Module to hide processes from system utilities
r00t-Taurus/Invoke-TheHash
PowerShell Pass The Hash Utils
r00t-Taurus/ipwhois
Retrieve and parse whois data for IPv4 and IPv6 addresses
r00t-Taurus/jhhjhgjiti
r00t-Taurus/LaZagne
Credentials recovery project
r00t-Taurus/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
r00t-Taurus/Modlishka
Modlishka. Reverse Proxy. Phishing NG.
r00t-Taurus/MS17-010
MS17-010
r00t-Taurus/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
r00t-Taurus/PoshC2_Python
Python Server for PoshC2
r00t-Taurus/Remote-Desktop-Caching-
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
r00t-Taurus/Sherlock
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
r00t-Taurus/SMBetray
SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over the wire in cleartext.
r00t-Taurus/spoofing-office-macro
:fish: PoC of a VBA macro spawning a process with a spoofed parent and command line.
r00t-Taurus/Sutekh
An example rootkit that gives a root shell
r00t-Taurus/SysWhispers
AV/EDR evasion via direct system calls.
r00t-Taurus/Tokenvator
A tool to elevate privilege with Windows Tokens
r00t-Taurus/trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
r00t-Taurus/TuxLogCleaner
a simple log cleaner for Linux
r00t-Taurus/windows-privesc-check
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems