Stars
😺 Running Hashcat on Google Colab with session backup and restore.
Everything you need about Burp Extension Generation
GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…
Sample pentest report provided by TCM Security
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Red team & penetration testing tools to exploit the capabilities of Intel AMT
Linux privilege escalation checks (systemd, dbus, socket fun, etc)
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
Exchange your privileges for Domain Admin privs by abusing Exchange
Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java
Orc is a post-exploitation framework for Linux written in Bash
This document describes common misconfigurations of F5 Networks BigIP systems.
PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.
Scripts created to help with post exploitation of a Windows host
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or an…
This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)
Community guide to securing and improving privacy on macOS.
Takes a URL and checks the system for the tilde enum vuln and then find the files.