topotam
All I know is that I know nothing. I like Windows, Active Directory and IoT/Hardware hacking.
Discreetly in your network
Pinned Repositories
ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
Backstab
A tool to kill antimalware protected processes
BOF_dumpclip
Beacon Object Files to dump content of clipboard
C2-Tool-Collection
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
CheckPlease
Payload-Agnostic Implant Security
Elevator
UAC Bypass by abusing RPC and debug objects.
Invoke-Phant0m
LaMarre
Topotam random stuff repos
PetitPotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
SharpWeb
.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.
topotam's Repositories
topotam/PetitPotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
topotam/LaMarre
Topotam random stuff repos
topotam/EnumStrike
Cobalt Strike Aggressor script to automate host and domain enumeration.
topotam/githubC2
Abusing Github API to host our C2 traffic, usefull for bypassing blocking firewall rules if github is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
topotam/Revenant
Revenant - A 3rd party agent for Havoc that aim to demonstrate evasion techniques in the context of a C2 framework
topotam/airstrike
topotam/AmsiScanBuffer
Digging deeper into AmsiScanBuffer internals, and identifying 7 possibles AMSI patching by forcing a conditional jump to a branch that sets the return value of AmsiScanBuffer to E_INVALIDARG and makes the AmsiScanBuffer fails
topotam/AtomLdr
A DLL loader with advanced evasive features
topotam/AtomPePacker
A Highly capable Pe Packer
topotam/BloodHound.py-Kerberos
A Python based ingestor for BloodHound
topotam/c_syscalls
Single stub direct and indirect syscalling with runtime SSN resolving for windows.
topotam/certsync
Dump NTDS with golden certificates and UnPAC the hash
topotam/Codecepticon
topotam/CVE-2022-33679
One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
topotam/CVE-2022-3699
Lenovo Diagnostics Driver EoP - Arbitrary R/W
topotam/DCMB
Dont Call Me Back - Dynamic kernel callback resolver.
topotam/FlavorTown
Various ways to execute shellcode
topotam/Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
topotam/GetFGPP
Get Fine Grained Password Policy
topotam/Havoc
The Havoc Framework
topotam/IFaultrepElevatedDataCollectionUAC
topotam/Inline-Execute-PE
Execute unmanaged Windows executables in CobaltStrike Beacons
topotam/KeeFarceReborn
A standalone DLL that exports databases in cleartext once injected in the KeePass process.
topotam/MCP-PoC
Minifilter Callback Patching Proof-of-Concept
topotam/ObfLoader
MAC, IPv4, UUID shellcode Loaders and Obfuscators to obfuscate the shellcode and using some native API to converts it to it binary format and loads it.
topotam/rust_syscalls
Single stub direct and indirect syscalling with runtime SSN resolving for windows.
topotam/sccmhunter
topotam/SharpNTLMRawUnHide
C# version of NTLMRawUnHide
topotam/TerraLdr
A Payload Loader Designed With Advanced Evasion Features
topotam/WinShellcode
Make your own windows shellcode