Pinned Repositories
A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Active-Directory-Administration-Cookbook
Active Directory Administration Cookbook, published by Packt
Active-Directory-Cheatsheet
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active-Directory-Exploitation-Cheat-Sheet-1
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active-Directory-Pentest-Notes
个人域渗透学习笔记
CVE-2021-24085
CVE-2021-3156
CVE-2021-3156
shadow_storage
Secure store files on USB disk
reverse-ex's Repositories
reverse-ex/shadow_storage
Secure store files on USB disk
reverse-ex/adalanche
Active Directory ACL Visualizer - who's really Domain Admin?
reverse-ex/ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
reverse-ex/ADHuntTool
official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)
reverse-ex/aesedb
async parser for JET
reverse-ex/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
reverse-ex/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
reverse-ex/azureOutlookC2
Azure Outlook Command & Control. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP = Abuse Microsoft Graph API for C2 Operations.
reverse-ex/community-threats
The largest, public library of adversary emulation plans in JSON. A place to share custom SCYTHE threats with the community. #ThreatThursday
reverse-ex/EDD
Enumerate Domain Data
reverse-ex/exo
A process manager & log viewer for dev
reverse-ex/exploits
reverse-ex/HandleKatz
PIC lsass dumper using cloned handles
reverse-ex/HOLLOW
EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode
reverse-ex/ImproHound
Identify the attack paths in BloodHound breaking your AD tiering
reverse-ex/Inveigh
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
reverse-ex/iocs
Indicators from Unit 42 Public Reports
reverse-ex/ItWasAllADream
A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
reverse-ex/Malware-IOCs
reverse-ex/PowerShell-1
A series of scripts
reverse-ex/PrintNightmare-LPE
CVE-2021-1675 (PrintNightmare)
reverse-ex/PurpleSharp
PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
reverse-ex/pypykatz
Mimikatz implementation in pure Python
reverse-ex/pywhisker
Python version of the C# tool for "Shadow Credentials" attacks
reverse-ex/SharpRDPHijack
A POC Remote Desktop (RDP) session hijack utility for disconnected sessions
reverse-ex/TeamViewer_Forensics
A series of functions to parse Teamviewer logs to answer specific questions
reverse-ex/ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
reverse-ex/veeam-creds
Python script to emulate vSsphere responses to retrieve stored passwords from weeam
reverse-ex/win10script
This is the Ultimate Windows 10 Script from a creation from multiple debloat scripts and gists from github.
reverse-ex/Windows10Debloater
Script to remove Windows 10 bloatware.