A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures
https://github.com/mytechnotalent/Reverse-Engineering
https://github.com/mytechnotalent/Reverse-Engineering
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together
https://github.com/signorrayan/RedTeam_toolkit
Offensive tooling notes and experiments in AutoIt_v3
https://github.com/V1V1/OffensiveAutoIt
https://github.com/signorrayan/RedTeam_toolkit
Offensive tooling notes and experiments in AutoIt_v3
https://github.com/V1V1/OffensiveAutoIt
Run binaries straight from memory in Linux
https://github.com/liamg/memit
403/401 Bypass Methods + Bash Automation + Your Support ;)
https://github.com/Dheerajmadhukar/4-ZERO-3
https://github.com/liamg/memit
403/401 Bypass Methods + Bash Automation + Your Support ;)
https://github.com/Dheerajmadhukar/4-ZERO-3
information about EDRs that can be useful during red team exercise
https://github.com/Mr-Un1k0d3r/EDRs
AV/EDR evasion via direct system calls
https://github.com/jthuraisamy/SysWhispers2
https://github.com/Mr-Un1k0d3r/EDRs
AV/EDR evasion via direct system calls
https://github.com/jthuraisamy/SysWhispers2
#cracken a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust
https://github.com/shmuelamar/cracken
#karma_v2 is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
https://github.com/Dheerajmadhukar/karma_v2
https://github.com/shmuelamar/cracken
#karma_v2 is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
https://github.com/Dheerajmadhukar/karma_v2
The fastest and safest AV1 encoder
https://github.com/xiph/rav1e
Safe, fast, small crypto using Rust
https://github.com/briansmith/ring
https://github.com/xiph/rav1e
Safe, fast, small crypto using Rust
https://github.com/briansmith/ring
proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool
https://github.com/FDlucifer/Proxy-Attackchain
ProxyVulns
https://github.com/hosch3n/ProxyVulns
https://github.com/FDlucifer/Proxy-Attackchain
ProxyVulns
https://github.com/hosch3n/ProxyVulns
VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS
https://github.com/l0ggg/VMware_vCenter
https://github.com/l0ggg/VMware_vCenter
A Visual Studio template used to create #Cobalt_Strike BOFs
https://github.com/securifybv/Visual-Studio-BOF-template
#Cobalt_Strike BOF - Bypass AMSI in a remote process with code injection
https://github.com/boku7/injectAmsiBypass
Tool for working with Direct System Calls in #Cobalt_Strike's Beacon Object Files (BOF) via Syswhispers2
https://github.com/Sh0ckFR/InlineWhispers2
A Beacon Object File (BOF) for #Cobalt_Strike which uses direct system calls to enable WDigest credential caching
https://github.com/outflanknl/WdToggle
https://github.com/securifybv/Visual-Studio-BOF-template
#Cobalt_Strike BOF - Bypass AMSI in a remote process with code injection
https://github.com/boku7/injectAmsiBypass
Tool for working with Direct System Calls in #Cobalt_Strike's Beacon Object Files (BOF) via Syswhispers2
https://github.com/Sh0ckFR/InlineWhispers2
A Beacon Object File (BOF) for #Cobalt_Strike which uses direct system calls to enable WDigest credential caching
https://github.com/outflanknl/WdToggle
scanner that detects #CVE-2021-21980 vulnerabilities VMware vCenter earlier versions (7.0.2.00100)
https://github.com/Osyanina/westone-CVE-2021-21980-scanner
Plex media server local privilige escalation poc #CVE-2021-42835
https://github.com/netanelc305/PlEXcalaison
Python tool for exploiting #CVE-2021-35616
https://github.com/Ofirhamam/OracleOTM
https://github.com/Osyanina/westone-CVE-2021-21980-scanner
Plex media server local privilige escalation poc #CVE-2021-42835
https://github.com/netanelc305/PlEXcalaison
Python tool for exploiting #CVE-2021-35616
https://github.com/Ofirhamam/OracleOTM
Master the command line in one page
https://github.com/jlevy/the-art-of-command-line
All sysmon event types and their fields explained
https://github.com/olafhartong/sysmon-cheatsheet
https://github.com/jlevy/the-art-of-command-line
All sysmon event types and their fields explained
https://github.com/olafhartong/sysmon-cheatsheet
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet
https://github.com/fatedier/frp
Xray, Penetrates Everything. Also the best v2ray-core, with XTLS support. Fully compatible configuration
https://github.com/XTLS/Xray-core
https://github.com/fatedier/frp
Xray, Penetrates Everything. Also the best v2ray-core, with XTLS support. Fully compatible configuration
https://github.com/XTLS/Xray-core
ByPass SSL Pinning with IP Forwarding | iptables
https://medium.com/@yoshimlutfi/bypass-ssl-pinning-with-ip-forwarding-iptables-568171b52b62
Microsoft Internet Explorer Active-X Control Security Bypass
https://packetstormsecurity.com/files/165160/MICROSOFT-INTERNET-EXPLORER-ACTIVEX-CONTROL-SECURITY-BYPASS.txt
https://medium.com/@yoshimlutfi/bypass-ssl-pinning-with-ip-forwarding-iptables-568171b52b62
Microsoft Internet Explorer Active-X Control Security Bypass
https://packetstormsecurity.com/files/165160/MICROSOFT-INTERNET-EXPLORER-ACTIVEX-CONTROL-SECURITY-BYPASS.txt
#Bugbounty Resources
https://github.com/aufzayed/bugbounty
Poc, EXP, scripts, privilege escalation, gadgets, etc related to penetration testing
https://github.com/Mr-xn/Penetration_Testing_POC
https://github.com/aufzayed/bugbounty
Poc, EXP, scripts, privilege escalation, gadgets, etc related to penetration testing
https://github.com/Mr-xn/Penetration_Testing_POC