Pinned Repositories
3XPL01t5
Random Exploits
CVE-2019-19781-CitrixRCE
Citrix Unauthorized Remote Code Execution Attacker - CVE-2019-19781
cve-2020-0688-webshell-upload-technique
cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output
CVE-2020-1938-Clean-Version
CVE-2020-1938(GhostCat) clean and readable code version
Invoke-PowerCloud
Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell
LonelyALPC-BypassUAC
Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]
MS08-067-Case-Study
OSWE
OSWE Preparation
Pentest-notes
Pentest stuff
wp-file-manager-0day
wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution
w4fz5uck5's Repositories
w4fz5uck5/3XPL01t5
Random Exploits
w4fz5uck5/Pentest-notes
Pentest stuff
w4fz5uck5/LonelyALPC-BypassUAC
Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]
w4fz5uck5/cve-2020-0688-webshell-upload-technique
cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output
w4fz5uck5/CVE-2019-19781-CitrixRCE
Citrix Unauthorized Remote Code Execution Attacker - CVE-2019-19781
w4fz5uck5/CVE-2020-1938-Clean-Version
CVE-2020-1938(GhostCat) clean and readable code version
w4fz5uck5/GCPSpray
This script will perform password spraying against Google Cloud Plataform (GCP).
w4fz5uck5/Get-ReverseShell
A solution to create obfuscated reverse shells for PowerShell.
w4fz5uck5/libmsgpack
C++ Header-only, experimental MessagePack encoder
w4fz5uck5/NetExec
The Network Execution Tool
w4fz5uck5/osed-scripts
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
w4fz5uck5/Wordpress-Rest-Extractor
Tool for pentesters to extract users and media attachments from wordpress using rest.
w4fz5uck5/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
w4fz5uck5/awesome-command-control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
w4fz5uck5/diaphora
Diaphora, the most advanced Free and Open Source program diffing tool.
w4fz5uck5/EXP-401-OSEE
A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.
w4fz5uck5/exploit_mitigations
Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
w4fz5uck5/ghostunnel
A simple SSL/TLS proxy with mutual authentication for securing non-TLS services
w4fz5uck5/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
w4fz5uck5/HEVD-CSharpKernelPwn
CSharp Writeups for HackSys Extreme Vulnerable Driver
w4fz5uck5/inj
w4fz5uck5/lib-nosa
ViperX Research Labs
w4fz5uck5/libelevate
Handle elevation DKOM against ObRegisterCallbacks
w4fz5uck5/linWinPwn
linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks
w4fz5uck5/PyMeow
Python Game Hacking Library
w4fz5uck5/PythonForWindows
A codebase aimed to make interaction with Windows and native execution easier
w4fz5uck5/ReflectiveNtdll
A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via SystemFucntion033 NtApi and No new thread via Fiber
w4fz5uck5/shhgit
Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories: www.shhgit.com
w4fz5uck5/TREVORspray
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
w4fz5uck5/Windows-Kernel-Explorer
A free but powerful Windows kernel research tool.