Pinned Repositories
CS-Remote-OPs-BOF
CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
cve-2019-19781
This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.
hate_crack
A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
meterssh
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.
ptf
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
SysmonCommunityGuide
TrustedSec Sysinternals Sysmon Community Guide
trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
trustedsec's Repositories
trustedsec/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
trustedsec/ptf
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
trustedsec/hate_crack
A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
trustedsec/CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
trustedsec/SysmonCommunityGuide
TrustedSec Sysinternals Sysmon Community Guide
trustedsec/CS-Remote-OPs-BOF
trustedsec/COFFLoader
trustedsec/nps_payload
This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources. Written by Larry Spohn (@Spoonman1091) Payload written by Ben Mauch (@Ben0xA) aka dirty_ben
trustedsec/tap
The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an organization.
trustedsec/orpheus
Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types
trustedsec/egressbuster
Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.
trustedsec/ridenum
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.
trustedsec/The_Shelf
Retired TrustedSec Capabilities
trustedsec/Obsidian-Vault-Structure
trustedsec/SeeYouCM-Thief
trustedsec/specula
trustedsec/User-Behavior-Mapping-Tool
trustedsec/SliverKeylogger
trustedsec/spoonmap
trustedsec/PPLFaultDumpBOF
trustedsec/CrackHound
trustedsec/CS_COFFLoader
trustedsec/defensive-scripts
trustedsec/Windows-MS-LSAT-RPC-Example
Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD
trustedsec/VerifyELF
trustedsec/Zoinks
Manage Engine Decrypter
trustedsec/TCS_InjectionTechniques
trustedsec/LLVM-Obfuscation-Experiments
trustedsec/impede