Lists (12)
Sort Name ascending (A-Z)
Starred repositories
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Exchange your privileges for Domain Admin privs by abusing Exchange
BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions
Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.
cobaltstrike4.5版本破/解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
smbclient-ng, a fast and user friendly way to interact with SMB shares.
.NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform!
java source code static code analysis and danger function identify prog
Java 代码审计-存在风险的函数汇总。方便我们日常代码审计过程中快速定位漏洞点,配合静态代码分析工具做到事半功倍。Java code audit - summary of risky functions. It is convenient for us to quickly locate vulnerability points in the daily code audit proces…
Scripted Local Linux Enumeration & Privilege Escalation Checks
MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
A Cobalt Strike memory evasion loader for redteamers
This project aims to compare and evaluate the telemetry of various EDR products.
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
一次免杀实践(bypass 360、huorong、windows defender、kaspersky、)
Simulate the behavior of AV/EDR for malware development training.
laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.