Pinned Repositories
Awesome_Firebase_DomainFront
Firebase Domain Front Code
BTHACK
Certificate-Transparency-Monitor---Rust
This project monitor certificate transparency lists . Additional feature is that this can be used to monitor with wildcards from bugbounties
DLL-Sideload
GolanginCsharp
Project to use Golang inside C#
heroku-reverse-proxy
Spin up a reverse proxy quickly on Heroku
My-Frida-Scripts
Frida Scripts Shantanu Use for Mobile Pentest
ParentProcessIDSpoof
Spoof parent process ID
SharpChisel
C# Wrapper around Chisel from https://github.com/jpillora/chisel
SharpLoginPrompt
shantanu561993's Repositories
shantanu561993/Certificate-Transparency-Monitor---Rust
This project monitor certificate transparency lists . Additional feature is that this can be used to monitor with wildcards from bugbounties
shantanu561993/My-Frida-Scripts
Frida Scripts Shantanu Use for Mobile Pentest
shantanu561993/RustRedOps
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
shantanu561993/AMSI-BYPASS
shantanu561993/AutoAppDomainHijack
Automated .NET AppDomain hijack payload generation
shantanu561993/awesome-injection
Centralized resource for listing and organizing known injection techniques and POCs
shantanu561993/Beacon_Source
not a reverse-engineered version of the Cobalt Strike Beacon
shantanu561993/BEAST-implementation
shantanu561993/BlueSpy
shantanu561993/ChromeKatz
Dump cookies directly from Chrome process memory
shantanu561993/CTL-Parse
My Attempt to parse the list to get some good info
shantanu561993/CVE-2024-21111
Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability
shantanu561993/CVE-2024-26229
CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
shantanu561993/CVE-2024-38077-POC
原文已被作者删除,备份用,非原创,EXP & POC
shantanu561993/cve-2024-6387-poc
a signal handler race condition in OpenSSH's server (sshd)
shantanu561993/deoptimizer
Machine code de-optimizer.
shantanu561993/devika
Devika is an Agentic AI Software Engineer that can understand high-level human instructions, break them down into steps, research relevant information, and write code to achieve the given objective. Devika aims to be a competitive open-source alternative to Devin by Cognition AI.
shantanu561993/DLLirant-1
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
shantanu561993/ETWInspector
shantanu561993/ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
shantanu561993/JS-Tap
JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application. Also includes a C2 for executing custom JavaScript payloads in clients, and a "mimic" feature that automatically generates custom payloads.
shantanu561993/LetMeowIn
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
shantanu561993/Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
shantanu561993/MoneyPrinterTurbo
利用AI大模型,一键生成高清短视频 Generate short videos with one click using AI LLM.
shantanu561993/obfusheader.h
Obfusheader.h is a portable header file for C++14 compile-time obfuscation.
shantanu561993/okta-terrify
Okta Verify and Okta FastPass Abuse Tool
shantanu561993/roop
one-click face swap
shantanu561993/sdsd
shantanu561993/SharpGraphView
Microsoft Graph API post-exploitation toolkit
shantanu561993/Voidgate
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions, thus rendering memory scanners useless for that specific memory page.