40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
https://github.com/linuxadi/40k-nuclei-templates
https://github.com/linuxadi/40k-nuclei-templates
Infostealer Exploit and the Enigma of Cookie Restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
A small program written in C that is designed to load 32-bit shellcode and allow for execution or debugging
https://github.com/jstrosch/sclauncher
https://github.com/jstrosch/sclauncher
This PoC creates multiple processes, where each process performs a specific task as part of the injection operation
https://github.com/Maldev-Academy/Christmas
https://github.com/Maldev-Academy/Christmas
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
Active Directory Pentesting from Linux
https://tbhaxor.com/active-directory-pentesting-from-linux
https://tbhaxor.com/active-directory-pentesting-from-linux
December 2023 BattlEye shellcode dump
https://github.com/SamuelTulach/be_shellcode_dump
https://github.com/SamuelTulach/be_shellcode_dump
Artillery: CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator
https://github.com/hackerhouse-opensource/Artillery
https://github.com/hackerhouse-opensource/Artillery
Compression using RDP API
https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190
https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190
Unmasking RedLine Stealer
https://www.infostealers.com/article/unmasking-redline-stealer
https://www.infostealers.com/article/unmasking-redline-stealer
Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout
https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
MITMonster: A monster cheatsheet on MITM attacks
https://github.com/wearecaster/MITMonster
https://github.com/wearecaster/MITMonster
Initial Access – search-ms URI Handler
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler
rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump
https://github.com/0vercl0k/rp-bf.rs
https://github.com/0vercl0k/rp-bf.rs
havoc-bloodhound: A GUI wrapper inside of Havoc to interact with bloodhound CE
https://github.com/p4p1/havoc-bloodhound
https://github.com/p4p1/havoc-bloodhound
Stinger: CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator
https://github.com/hackerhouse-opensource/Stinger
https://github.com/hackerhouse-opensource/Stinger
Collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam
https://github.com/emrekybs/AD-AssessmentKit
https://github.com/emrekybs/AD-AssessmentKit
SharpGhostTask: A C# port from Invoke-GhostTask
https://github.com/dmcxblue/SharpGhostTask
https://github.com/dmcxblue/SharpGhostTask