wh0amitz
Red Team / Offensive Security. Web Security / Windows Active Directory / Post Exploitation
nt authority\systemBeijing
Pinned Repositories
BypassCredGuard
Credential Guard Bypass Via Patching Wdigest Memory
CTFCON2023-POC
KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
PetitPotato
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
S4UTomato
Escalate Service Account To LocalSystem via Kerberos
SharpADWS
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
SharpRODC
To audit the security of read-only domain controllers
wh0amitz
wh0amitz.github.io
wh0amitz's Repositories
wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
wh0amitz/SharpADWS
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
wh0amitz/PetitPotato
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
wh0amitz/S4UTomato
Escalate Service Account To LocalSystem via Kerberos
wh0amitz/BypassCredGuard
Credential Guard Bypass Via Patching Wdigest Memory
wh0amitz/SharpRODC
To audit the security of read-only domain controllers
wh0amitz/CTFCON2023-POC
wh0amitz/wh0amitz.github.io
wh0amitz/wh0amitz
wh0amitz/anything-llm
A multi-user ChatGPT for any LLMs and vector database. Unlimited documents, messages, and storage in one privacy-focused app. Now available as a desktop application!
wh0amitz/POC
收集整理漏洞EXp/POC,大部分漏洞来源网络,目前收集整理了600多个poc/exp,长期更新。