secdev02's Repositories
secdev02/Azure-Red-Team
Azure Security Resources and Notes
secdev02/coredns
CoreDNS is a DNS server that chains plugins
secdev02/Talks
secdev02/ollama
Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 3, Mistral Small 3.1 and other large language models.
secdev02/cli
Cross-platform commandline utility listening for requests and emails from a Webhook.site URL and forwards them locally
secdev02/webhook.site
⚓️ Easily test HTTP webhooks with this handy tool that displays requests instantly.
secdev02/EntraPassTheCert
tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it
secdev02/CloudSync
Sync Windows directory with remote directory using Windows Cloud Files API
secdev02/headscale
An open source, self-hosted implementation of the Tailscale control server
secdev02/GNFS
A complete, proof-of-concept, C# implementation of the General Number Field Sieve algorithm for factoring very large semi-prime numbers. The focus was on readability and understandability of the code, not performance.
secdev02/AtomicBlueTeam
Tests to create artifacts, events, and telemtry
secdev02/DSInternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
secdev02/outbound-vpc-filtering-proxy
Outbound VPC proxy with domain whitelisting and content filtering
secdev02/cs-script
C# scripting platform
secdev02/DeepSeek-R1
secdev02/DriverQueryMCP
Query a list of running Drivers and evaluate the output
secdev02/roadrecon_mcp_server
Claude MCP server to perform analysis on ROADrecon data
secdev02/pokerkit
An open-source Python library for poker game simulations, hand evaluations, and statistical analysis
secdev02/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
secdev02/SMB-HoneyPot
A Simplistic SMB HoneyPot With AbuseIPDB Reporting
secdev02/HoneyBadger
Honey Badger Don't Give A F*ck
secdev02/OpenBullet2
OpenBullet reinvented
secdev02/servers
Model Context Protocol Servers
secdev02/DeceptionFS
A sample using Windows Projected File System for Deception
secdev02/defending-off-the-land
Assortment of scripts and tools for our Blackhat EU 2024 talk
secdev02/Harden-Windows-Security
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | Read The Rationale https://github.com/HotCakeX/Harden-Windows-Security/blob/main/Rationale.md
secdev02/WDAC-Framework
Easily create, deploy, and edit Windows Defender Application Control (WDAC) policies. Allows for careful review of app information before trusting WDAC rules. Manage your policies with WinRM (remote PowerShell) and SQLite.
secdev02/hawk
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
secdev02/windows-coerced-authentication-methods
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
secdev02/ComDotNetExploit
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases bypassing code integrity checks and loading malicious payloads in highly protected processes such as LSASS. Based on research from James Forshaw.