Pinned Repositories
literature_review
Survey of program analysis research with a focus on machine code
Cheatsheets
Penetration Testing/Security Cheatsheets
Go-Go-GadgetGospel
Quick Start/Setup of CI/CD for Offensive/Defensive Purposes
handbook
The CryptoParty Handbook
hyperdbg
Automatically exported from code.google.com/p/hyperdbg
Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
literature_review
Survey of program analysis research with a focus on machine code
MIS
SharpAttack
A simple wrapper for C# tools
rmusser01's Repositories
rmusser01/how-to-secure-anything
How to systematically secure anything: a repository about security engineering
rmusser01/architecture_decision_record
Architecture decision record (ADR) examples for software planning, IT leadership, and template documentation
rmusser01/WindowsExploitationResources
Resources for Windows exploit development
rmusser01/AMSITrigger
The Hunt for Malicious Strings
rmusser01/AndroidTacticalAssaultKit-CIV
rmusser01/dll-hijack-by-proxying
Exploiting DLL Hijacking by DLL Proxying Super Easily
rmusser01/Empire
Empire is a PowerShell and Python 3.x post-exploitation framework.
rmusser01/exploit
rmusser01/hooking
Resources About Hooking. For All Platforms. Currently 300+ Tools And 600+ Posts.
rmusser01/NetLoader
Loads any C# binary in mem, patching AMSI and bypassing Windows Defender
rmusser01/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
rmusser01/RedCsharp
Collection of C# projects. Useful for pentesting and redteaming.
rmusser01/WinPwn
Automation for internal Windows Penetrationtest / AD-Security
rmusser01/dropengine
rmusser01/Evasor
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
rmusser01/GhostLoader
GhostLoader - AppDomainManager - Injection - 攻壳机动队
rmusser01/go-shellcode
A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.
rmusser01/GolanginCsharp
Project to use Golang inside C#
rmusser01/KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor
rmusser01/macros
rmusser01/ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
rmusser01/PEzor
Read the blog post here: https://iwantmore.pizza/posts/PEzor.html
rmusser01/PoC-in-GitHub
📡 PoC auto collect from GitHub.
rmusser01/shellcode
Shellcodes for Windows/Linux/BSD running on x86, AMD64, ARM, ARM64
rmusser01/super-linter
Combination of multiple linters to install as a GitHub Action
rmusser01/TransitionalPeriod
Experiment on producing Ring 0 to Ring 3 transition shellcode in C for x64 / x86. Uses PsSetContextThread() to direct execution. Interrupt Request Level ( IRQL ) Migration From DISPATCH_LEVEL to PASSIVE_LEVEL is done via Work Items
rmusser01/truffleHogRegexes
These are the regexes that power truffleHog
rmusser01/windows-ps-callbacks-experiments
Files for http://deniable.org/windows/windows-callbacks
rmusser01/WMIReg
PoC to interact with local/remote registry hives through WMI
rmusser01/zeropress
A dumb script for finding dumb coding errors in WordPress plugins