You Can Now Automatically Launch
Profiles as Administrator
Windows Terminal 1.13 Release ♻️
https://devblogs.microsoft.com/commandline/windows-terminal-preview-1-13-release
download
https://github.com/microsoft/terminal/releases
Profiles as Administrator
Windows Terminal 1.13 Release ♻️
https://devblogs.microsoft.com/commandline/windows-terminal-preview-1-13-release
download
https://github.com/microsoft/terminal/releases
OSINT tools catalog
https://github.com/HowToFind-bot/osint-tools
A collection of hacks and one-off scripts
https://github.com/tomnomnom/hacks
Tools, scripts and tips useful during Penetration Testing engagements
https://github.com/maldevel/PenTestKit
All in One Cracker Tools for Hacking
https://github.com/cracker911181/Cracker-Tool
A web hacking toolkit Docker image with GUI applications support
https://github.com/signedsecurity/web-hacking-toolkit
https://github.com/HowToFind-bot/osint-tools
A collection of hacks and one-off scripts
https://github.com/tomnomnom/hacks
Tools, scripts and tips useful during Penetration Testing engagements
https://github.com/maldevel/PenTestKit
All in One Cracker Tools for Hacking
https://github.com/cracker911181/Cracker-Tool
A web hacking toolkit Docker image with GUI applications support
https://github.com/signedsecurity/web-hacking-toolkit
Get fresh Syscalls from a fresh ntdll.dll copy
https://github.com/S3cur3Th1sSh1t/NimGetSyscallStub
Hellsgate + Halosgate/Tartarosgate Ensures that all systemcalls go through ntdll.dll
https://github.com/thefLink/RecycledGate
https://github.com/S3cur3Th1sSh1t/NimGetSyscallStub
Hellsgate + Halosgate/Tartarosgate Ensures that all systemcalls go through ntdll.dll
https://github.com/thefLink/RecycledGate
Stop Defender Service using C# via Token Impersonation
https://github.com/dosxuz/DefenderStop
A simple program to monitor your network/data usage. Made for the average windows user
https://github.com/Ashfaaq18/OpenNetMeter
https://github.com/dosxuz/DefenderStop
A simple program to monitor your network/data usage. Made for the average windows user
https://github.com/Ashfaaq18/OpenNetMeter
An architecture-agnostic ELF file flattener for shellcode
https://github.com/gamozolabs/elfloader
Process & Memory Hacking Library (Windows/Linux/BSD/Android) (C/C++/Python) (x86/x64, ARM/ARM64)
https://github.com/rdbo/libmem
https://github.com/gamozolabs/elfloader
Process & Memory Hacking Library (Windows/Linux/BSD/Android) (C/C++/Python) (x86/x64, ARM/ARM64)
https://github.com/rdbo/libmem
Encrypted PE Loader Generator
https://github.com/frkngksl/Huan
KaynLdr is a Reflective Loader written in C/ASM
https://github.com/Cracked5pider/KaynLdr
Evasive shellcode loader for bypassing event-based injection detection
https://github.com/xuanxuan0/DripLoader
https://github.com/frkngksl/Huan
KaynLdr is a Reflective Loader written in C/ASM
https://github.com/Cracked5pider/KaynLdr
Evasive shellcode loader for bypassing event-based injection detection
https://github.com/xuanxuan0/DripLoader
Red Team Tools keylogger free version, x86 & x64, bypass AV and CobaltStrike version 4.4
password: HelloWorld
https://github.com/angels520/redteamT00ls
password: HelloWorld
https://github.com/angels520/redteamT00ls
Bug Bounty Automation With Python.pdf
1.1 MB
Cheatsheet for Penetest and Red Team
https://github.com/Ignitetechnologies/bugbounty
A list of resources for those interested in getting started in bug bounties
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
https://github.com/Ignitetechnologies/bugbounty
A list of resources for those interested in getting started in bug bounties
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
php kill-free webshell
https://github.com/xzajyjs/Anti-Virus-PHP
Phpstudy RCE EXP
https://github.com/xzajyjs/phpstudy_Backdoor-EXP
https://github.com/xzajyjs/Anti-Virus-PHP
Phpstudy RCE EXP
https://github.com/xzajyjs/phpstudy_Backdoor-EXP
CLI program to analyze DNS queries
https://github.com/jvns/tiny-resolver
Website FingerPrint Recognition
https://github.com/hakuQAQ/Holmes
https://github.com/jvns/tiny-resolver
Website FingerPrint Recognition
https://github.com/hakuQAQ/Holmes
Active Directory & Red-Team Cheat-Sheet in constant expansion
https://github.com/RistBS/Awesome-RedTeam-Cheatsheet
A collection of awesome one-liner scripts for bug bounty hunting
https://github.com/litt1eb0yy/One-Liner-Scripts
https://github.com/RistBS/Awesome-RedTeam-Cheatsheet
A collection of awesome one-liner scripts for bug bounty hunting
https://github.com/litt1eb0yy/One-Liner-Scripts
C# implementation of the token privilege removal flaw discovered by: GabrielLandau / Elastic
https://github.com/MartinIngesen/TokenStomp
https://github.com/MartinIngesen/TokenStomp
Emerging Threat of Containerized Malware
https://github.com/mgeeky/PackMyPayload
High speed passive DNS collector with dnstap support, dns traffic sniffer and more
https://github.com/dmachard/dns-collector
https://github.com/mgeeky/PackMyPayload
High speed passive DNS collector with dnstap support, dns traffic sniffer and more
https://github.com/dmachard/dns-collector
Red Team Resources
https://github.com/Digit4lBytes/RedTeam
Advanced-Process-Injection-Workshop by CyberWarFare Labs
https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop
https://github.com/Digit4lBytes/RedTeam
Advanced-Process-Injection-Workshop by CyberWarFare Labs
https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop
A story of leaking uninitialized memory from Fastly
https://medium.com/@emil.lerner/leaking-uninitialized-memory-from-fastly-83327bcbee1f
Exploring UNIX pipes for iOS kernel exploit primitives, and introducing kalloc_data_require
https://tfp0labs.com/blog/unix-pipes-exploitation
https://medium.com/@emil.lerner/leaking-uninitialized-memory-from-fastly-83327bcbee1f
Exploring UNIX pipes for iOS kernel exploit primitives, and introducing kalloc_data_require
https://tfp0labs.com/blog/unix-pipes-exploitation
Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
3.4 MB
A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery
https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
offensivecon_22_attacking_javascript_engines.pdf
923.7 KB
Attacking JavaScript Engines in 2022
https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf
https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf