Lists (3)
Sort Name ascending (A-Z)
Stars
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using social engineering techniques.
A swiss army knife for pentesting networks
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Códigos soltos usados em respostas minhas no Stack Overflow em português
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Collection of Cyber Threat Intelligence sources from the deep and dark web
cabelo / lama
Forked from advimman/lama🦙 LaMa Image Inpainting, Resolution-robust Large Mask Inpainting with Fourier Convolutions, WACV 2022
Notion as a platform for offensive operations
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
Collection of malware source code for a variety of platforms in an array of different programming languages.
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
Malware development for red teaming workshop
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
A helpful Java Deserialization exploit framework.
All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
Cnvd-2020-10487 / cve-2020-1938, scanner tool