Pinned Repositories
at-ps
Adversary Tactics - PowerShell Training
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
AWE-OSEE-Prep
Advanced Windows Exploitation (AWE)/Offensive Security Exploitation Expert (OSEE) Preparation for BlackHat 2020
awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
AwesomeExploits
A collection of exploits
exploitdb
The official Exploit Database repository
msfpc
MSFvenom Payload Creator (MSFPC)
secDevLabs
Laboratory for those who are interested in learning about web security
SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
StarManager
Organize, tag, and search your GitHub stars. [Work in Progress]
sec00's Repositories
sec00/AwesomeExploits
A collection of exploits
sec00/at-ps
Adversary Tactics - PowerShell Training
sec00/AWE-OSEE-Prep
Advanced Windows Exploitation (AWE)/Offensive Security Exploitation Expert (OSEE) Preparation for BlackHat 2020
sec00/awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
sec00/awesome-mobile-security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools are belong to their respective owners. I'm just maintaining it.
sec00/browser_pwn
browser pwn, main work now
sec00/CloneProcess
Clone running process with ZwCreateProcess
sec00/DarthSidious
Building an Active Directory domain and hacking it
sec00/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
sec00/EasyHook
EasyHook - The reinvention of Windows API Hooking
sec00/Event-Forwarding-Guidance
Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
sec00/ExecuteShellcodeWithSyscalls
Execute shellcode with syscalls from C# .dll
sec00/HiddenEye
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
sec00/HideCode
Hide code from dnSpy and other C# spying tools
sec00/kernel-exploits
My proof-of-concept exploits for the Linux kernel
sec00/linux-kernel-exploitation
A collection of links related to Linux kernel exploitation
sec00/NewShell
Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode
sec00/nightmare
sec00/Pentesting
Tricks for penetration testing
sec00/Redcloud
Automated Red Team Infrastructure deployement using Docker
sec00/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
sec00/ReverseTCPShell
PowerShell ReverseTCP Framework
sec00/security-advisories
A database of PHP security advisories
sec00/SysWhispers
AV/EDR evasion via direct system calls.
sec00/thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
sec00/VBA-DLL-WMI-EXECUTION
Call your own DLL from VBA and execute code under process svchost.exe with WMI
sec00/vmware-exploitation
A collection of links related to VMware escape exploits
sec00/Windows10Exploits
Microsoft » Windows 10 : Security Vulnerabilities
sec00/XSStrike
Most advanced XSS scanner.
sec00/Zeta
Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger