Real profit
2.88K subscribers
107 photos
4 videos
155 files
3.37K links
Just invest your time
Download Telegram
40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
https://github.com/linuxadi/40k-nuclei-templates
A small program written in C that is designed to load 32-bit shellcode and allow for execution or debugging
https://github.com/jstrosch/sclauncher
This PoC creates multiple processes, where each process performs a specific task as part of the injection operation
https://github.com/Maldev-Academy/Christmas
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
December 2023 BattlEye shellcode dump
https://github.com/SamuelTulach/be_shellcode_dump
Artillery: CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator
https://github.com/hackerhouse-opensource/Artillery
Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout
https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
MITMonster: A monster cheatsheet on MITM attacks
https://github.com/wearecaster/MITMonster
The Mac Malware of 2023 👾
https://objective-see.org/blog/blog_0x77
rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump
https://github.com/0vercl0k/rp-bf.rs
havoc-bloodhound: A GUI wrapper inside of Havoc to interact with bloodhound CE
https://github.com/p4p1/havoc-bloodhound
Stinger: CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator
https://github.com/hackerhouse-opensource/Stinger
Collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam
https://github.com/emrekybs/AD-AssessmentKit
pendulum: Sleep obfuscation for Linux
https://github.com/kyleavery/pendulum
SharpGhostTask: A C# port from Invoke-GhostTask
https://github.com/dmcxblue/SharpGhostTask