Pinned Repositories
akb
Attack Knowledge Base
AVRFProviderHook
Application Verifier hook via Provider
awesome-awesomeness
A curated list of awesome awesomeness
awesome-cve-poc
✍️ A curated list of CVE PoCs.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
b-neat
bnj
BTFS
FUSE-based bittorrent file system (also called torrentfs or torrent filesystem) for streaming content directly from the internets.
onecloud
API client for 1cloud.ru
xmrig-proxy
XMRig Proxy
shtrix's Repositories
shtrix/akb
Attack Knowledge Base
shtrix/awesome-cve-poc
✍️ A curated list of CVE PoCs.
shtrix/dnscat2-powershell
A Powershell client for dnscat2, an encrypted DNS command and control tool.
shtrix/Empire
Empire is a PowerShell and Python post-exploitation agent.
shtrix/foolavc
foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV
shtrix/gray_hat_csharp_code
This repository contains full code examples from the book Gray Hat C#
shtrix/Invoke-Obfuscation
PowerShell Obfuscator
shtrix/Kansa
A Powershell incident response framework
shtrix/labs
Vulnerability Labs for security analysis
shtrix/linux
Linux kernel source tree
shtrix/MorphAES
IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it's cross-platform as well and library-independent.
shtrix/MS17-010
MS17-010
shtrix/Piper
Creates a local or remote port forwarding through named pipes.
shtrix/portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
shtrix/PowerShell-Suite
My musings with PowerShell
shtrix/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
shtrix/PSSE
PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking the SecurityTube PowerShell for Pentesters course
shtrix/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
shtrix/pwnat
The only tool to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, or spoofing required.
shtrix/python-examples
Examples for some key libraries in Python that I use all the time. A way for me to remember and hopefully get others started.
shtrix/pywinrm
Python library for Windows Remote Management (WinRM)
shtrix/Rats
Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit for ethical hackers. we begin with delivery methods, anti-virus evastion and continue on to local acceleration of privileges in order to get a privileged persistent on the target machine. in this Repo we will try to simulate a full on root-kit throw hiding our persistence mechanism of action and simulating a real targeted campaign against any company or retailer. i do not supply any binary's for any of the Rat components, nither forge certificate's or native executable's. on the other hand i will try to give as much information as possible on how to avoid getting hit by this kind of exploit, and ll' try to supply as many open resources as possible to implement your own tool, for ethical hacking purposes, and for anti-virus software writers.
shtrix/redsnarf
RedSnarf is a pen-testing / red-teaming tool for Windows environments
shtrix/RobustPentestMacro
This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploitation techniques.
shtrix/rsg
ReverShellGenerator - A tool to generate various ways to do a reverse shell
shtrix/SecLists
SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
shtrix/SomeStuff
Some PowerShell Stuff
shtrix/WMI
WMI Related Scripts
shtrix/xmr-proxy
Stratum Proxy for Monero-pools
shtrix/xmr-stak-cpu
Monero CPU miner