Pinned Repositories
API-dnsdumpster.com
(Unofficial) Python API for https://dnsdumpster.com/
CallbackHell
PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
ComPP
Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
FUD-ShellCode-UUID
Making Shellcode fully undetectable using uuid
Invoke-Nanodump
HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection
NimHollow
Nim implementation of Process Hollowing using syscalls (PoC)
PlayWithDefender
An easy tool to disable and enable windows defender protections
Simple-Dll-Injector
SnD_AMSI
Start new PowerShell without etw and amsi in pure nim
unDefender
Killing your preferred antimalware by abusing native symbolic links and NT paths.
whydee86's Repositories
whydee86/SnD_AMSI
Start new PowerShell without etw and amsi in pure nim
whydee86/PlayWithDefender
An easy tool to disable and enable windows defender protections
whydee86/FUD-ShellCode-UUID
Making Shellcode fully undetectable using uuid
whydee86/Simple-Dll-Injector
whydee86/ComPP
Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
whydee86/Invoke-Nanodump
HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection
whydee86/NimHollow
Nim implementation of Process Hollowing using syscalls (PoC)
whydee86/unDefender
Killing your preferred antimalware by abusing native symbolic links and NT paths.
whydee86/API-dnsdumpster.com
(Unofficial) Python API for https://dnsdumpster.com/
whydee86/CallbackHell
PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
whydee86/dnsx
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
whydee86/LocateMe
Get Your Victim's Location, Organization, Co-ordinates and much more...
whydee86/malice
VirusTotal Wanna Be - Now with 100% more Hipster
whydee86/myNimExamples
my mim examples.
whydee86/NimExamples
A collection of offensive Nim example code
whydee86/NimJection
Nim Shellcode Injector
whydee86/nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
whydee86/OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
whydee86/Perfusion
Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)
whydee86/PEx64-Injector
Inject your x64 bit executable to any process, masking it as a legitimate process for Anti-Virus evasion.
whydee86/PickleC2
PickleC2 is a post-exploitation and lateral movements framework
whydee86/SecretFinder
SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files
whydee86/tld-list
List of all top-level domains in all data formats.
whydee86/VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios