Highlights
- Pro
Lists (6)
Sort Last updated
Starred repositories
AV/EDR evasion via direct system calls.
📓 Reference guide for scanning networks with Nmap.
Next-Gen Stealer written in Go. Stealing from Discord, Chromium-Based & Firefox-Based Browsers, Crypto Wallets and more, from every user on every disk. (PoC. For educational purposes only)
Password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and …
A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b) Watermarking: Watermarking image files with an invisible si…
These confs are pulled into our SWAG image: https://github.com/linuxserver/docker-swag
A curated list of awesome tools, research, papers and other projects related to password cracking and password security.
Disk encryption with strong security based on TrueCrypt
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Two in one, patch lifetime powershell console, no more etw and amsi!
Knowledge needed to obtain the OSCP certification
getsystem via parent process using ps1 & embeded c#
A curated list of awesome open source workflow engines
fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
Exchange privilege escalations to Active Directory
All in One OSCP Preparation Material
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS…
Generates malicious LNK file payloads for data exfiltration
Scanning APK file for URIs, endpoints & secrets.
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in …