Pinned Repositories
AutoGen
Automatically generate MSFT Detours registration and interception functions
cve-2019-11477-poc
drawbridge
Research repository. Don't use anything here for a serious purpose.
Security-Assessment
Scripts to automate some part of Security/Vulnerability Assessment
TL-FRAUD
A collection of fraud related tools for research.
ViolentFungus-C2
Violent Fungus is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff. WIP.
wiggle
The concepting self hosted executable binary search engine
sasqwatch's Repositories
sasqwatch/ViolentFungus-C2
Violent Fungus is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff. WIP.
sasqwatch/AIL-framework
AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project
sasqwatch/attack-surface-framework
Tool to discover external and internal network attack surface
sasqwatch/Azur3Alph4
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
sasqwatch/cont3xt
sasqwatch/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
sasqwatch/DInvoke
Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
sasqwatch/dnsmonster
Passive DNS Capture/Monitoring Framework
sasqwatch/fibratus
A modern tool for the Windows kernel exploration and tracing
sasqwatch/fltmc
Cooked fltMC
sasqwatch/Huan
Encrypted PE Loader Generator
sasqwatch/IPvSeeYou
Repository for the IPvSeeYou talk at Black Hat 2021
sasqwatch/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
sasqwatch/moneta
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
sasqwatch/Ninja
Open source C2 server created for stealth red team operations
sasqwatch/NSGenCS
Extendable payload obfuscation and delivery framework
sasqwatch/Octopus
Open source pre-operation C2 server based on python and powershell
sasqwatch/PowerShx
Run Powershell without software restrictions.
sasqwatch/PR0CESS
some gadgets about windows process and ready to use :)
sasqwatch/red_team_attack_lab
Red Team Attack Lab for TTP testing & research
sasqwatch/RemotePotato0
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
sasqwatch/ServiceMove-BOF
New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.
sasqwatch/shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
sasqwatch/SharpC2-1
Command and Control Framework written in C#.
sasqwatch/SharpStrike
A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
sasqwatch/SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
sasqwatch/UACME
Defeating Windows User Account Control
sasqwatch/unDefender
Killing your preferred antimalware by abusing native symbolic links and NT paths.
sasqwatch/Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
sasqwatch/xlsKami
Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets