Pinned Repositories
0xb11a1_yetAnotherObfuscator
C# obfuscator that bypass windows defender
0xHossam_Killer
Is a tool created to evade AVs and EDRs or security tools.
0xor0ne_debugoff
Linux anti-debugging and anti-analysis rust library
0xsp-SRD_mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
0xthirteen_AssemblyHunter
p0dalirius_ExtractBitlockerKeys
A post-exploitation python script to automatically extract the bitlocker recovery keys from a domain.
tigr0w's Repositories
tigr0w/adalanche
Active Directory ACL Visualizer - who's really Domain Admin?
tigr0w/BC-SECURITY_Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
tigr0w/binarly-io_efiXplorer
IDA plugin for UEFI firmware analysis and reverse engineering automation
tigr0w/binarly-io_SupplyChainAttacks
tigr0w/binarly-io_ToolsAndPoCs
BINARLY Research Tools and PoCs
tigr0w/binarly-io_Vulnerability-REsearch
Binarly Vulnerability Research Advisories
tigr0w/carloslack_KoviD
Kernel rk
tigr0w/cloudflare_flan
A pretty sweet vulnerability scanner
tigr0w/daem0nc0re_PrivFu
Kernel mode WinDbg extension and PoCs for token privilege investigation.
tigr0w/darkoperator_dnsrecon
DNS Enumeration Script
tigr0w/DodyMagic_mentaldice_swift
tigr0w/Flangvik_ObfuscatedSharpCollection
Attempt at Obfuscated version of SharpCollection
tigr0w/fortra_No-Consolation
A BOF that runs unmanaged PEs inline
tigr0w/FunnyWolf_Viper
Redteam operation platform with webui 图形化红队行动辅助平台
tigr0w/gtworek_PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
tigr0w/hasherezade_hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
tigr0w/hasherezade_pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
tigr0w/Impact-I_reFlutter
Flutter Reverse Engineering Framework
tigr0w/its-a-feature_Mythic
A collaborative, multi-platform, red teaming framework
tigr0w/jm33-m0_emp3r0r
Linux/Windows post-exploitation framework made by linux user
tigr0w/JonathanSalwan_ROPgadget
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
tigr0w/LordNoteworthy_al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
tigr0w/magicsword-io_LOLDrivers
Living Off The Land Drivers
tigr0w/MythicAgents_arachne
tigr0w/srlabs_blue-merle
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
tigr0w/susMdT_secondsite.github.io
✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com
tigr0w/TheCruZ_kdmapper
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
tigr0w/tijldeneut_diana
Diana Credential Recovery Framework
tigr0w/trustedsec_CS-Remote-OPs-BOF
tigr0w/xpn_OktaPostExToolkit