zetafr's Stars
iptv-org/iptv
Collection of publicly available IPTV channels from all over the world
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
HavocFramework/Havoc
The Havoc Framework.
hfiref0x/UACME
Defeating Windows User Account Control
khast3x/h8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Pennyw0rth/NetExec
The Network Execution Tool
byt3bl33d3r/OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
hasherezade/pe_to_shellcode
Converts PE into a shellcode
Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
sevagas/macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
jthuraisamy/SysWhispers
AV/EDR evasion via direct system calls.
electron/rcedit
Command line tool to edit resources of exe
Dec0ne/KrbRelayUp
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
optiv/Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
HashPals/Search-That-Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
S3cur3Th1sSh1t/OffensiveVBA
This repo covers some code execution and AV Evasion methods for Macros in Office documents
Ne0nd0g/go-shellcode
A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.
secrary/InjectProc
InjectProc - Process Injection Techniques [This project is not maintained anymore]
mgeeky/PackMyPayload
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
SafeBreach-Labs/pinjectra
Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)
icyguider/Nimcrypt2
.NET, PE, & Raw Shellcode Packer/Loader Written in Nim
PeterDaveHello/tor-socks-proxy
🐳 Tiny Docker image (🤏 10MB) as 🧅 Tor SOCKS5 proxy 🛡
OpenSecurityResearch/dllinjector
dll injection tool that implements various methods
ewhitehats/InvisiblePersistence
Persisting in the Windows registry "invisibly"
byt3bl33d3r/SpamChannel
Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)
r4wd3r/RID-Hijacking
Windows RID Hijacking persistence technique
ajpc500/NimlineWhispers
A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.
JohnWoodman/VBA-Macro-Reverse-Shell
Fully functioning reverse shell written entirely in VBA.
k1nd0ne/ScapyWifi
Scapy 802.1X exploitation framework.
rmdavy/StopDefender
Stop Windows Defender programmatically