Pinned Repositories
ace-firefist
Attack chain emulator. Write recipes for initial access easily
COMProxy
PoC for proxying COM objects when hijacking
CSharpSC
C# Secure Coding Demos and Exercises
DotNet-API-Demo
Included aditional API for HTTP/2
ffw
A fuzzing framework for network servers
GCPBucketBrute
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
hunter
(l)user hunter using WinAPI calls only
iofuzz
A mutation based user mode (ring3) dumb in-memory IOCTL Fuzzer/Logger. This script attach it self to any given process and hooks DeviceIoControl!Kernel32 API and try to log or fuzz all I/O Control code I/O Buffer pointer, I/O buffer length that process sends to any Kernel driver.
MalwareDevTalk
Tcpdump-Crashes
Crashes found on fuzzing tcpdump 4.6.2
threatpointer's Repositories
threatpointer/Tcpdump-Crashes
Crashes found on fuzzing tcpdump 4.6.2
threatpointer/ace-firefist
Attack chain emulator. Write recipes for initial access easily
threatpointer/COMProxy
PoC for proxying COM objects when hijacking
threatpointer/CSharpSC
C# Secure Coding Demos and Exercises
threatpointer/DotNet-API-Demo
Included aditional API for HTTP/2
threatpointer/ffw
A fuzzing framework for network servers
threatpointer/GCPBucketBrute
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
threatpointer/hunter
(l)user hunter using WinAPI calls only
threatpointer/iofuzz
A mutation based user mode (ring3) dumb in-memory IOCTL Fuzzer/Logger. This script attach it self to any given process and hooks DeviceIoControl!Kernel32 API and try to log or fuzz all I/O Control code I/O Buffer pointer, I/O buffer length that process sends to any Kernel driver.
threatpointer/MalwareDevTalk
threatpointer/mptcp-scapy
MPTCP firewall tester based on scapy
threatpointer/MsFontsFuzz
OpenType font file format fuzzer for Windows
threatpointer/NDIS
Windows Kernel Driver - Create a driver device in intermediate layer of Windows kernel based on NDIS, which communicates with and connect upper layer (user mode applications) and lower layer (miniport driver/network card). Create self-defined protocols for transmitting data and control communications by simulating very simple HTTP, TCP and ARP protocols. Try best to implement connection establishing mechanism and retry sending mechanism following TCP’s specification in order to achieve stable data transmission. So it can walk around system TCP protocol layer and firewall to capture and send custom data packets.
threatpointer/Offensive-scripts
threatpointer/p0wnedShell
PowerShell Runspace Post Exploitation Toolkit
threatpointer/Responder
Responder is a LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
threatpointer/SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
threatpointer/TDL
Driver loader for bypassing Windows x64 Driver Signature Enforcement
threatpointer/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
threatpointer/windows-itpro-docs
This repository is used for Windows client for IT Pro content on Microsoft Learn.
threatpointer/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
threatpointer/ysoserial.net
Deserialization payload generator for a variety of .NET formatters