Nim-Loader – WIP Shellcode Loader In Nim With EDR Evasion Techniques
a very rough work-in-progress adventure into learning nim by cobbling resources together to create a shellcode loader that implements common...
a very rough work-in-progress adventure into learning nim by cobbling resources together to create a shellcode loader that implements common...
Web app authorisation coverage scanning. Introduction AuthCov crawls your web application using a Chrome headless browser while logged in as...
"Norimaci" is a simple and lightweight Installation git clone https://github.com/mnrkbys/norimaci.git Future Work YARA scanning VirusTotal scanning Author Minoru Kobayashi License...
Simple C2 over Trello's API (Proof-of-Concept) By: Fabrizio Siciliano (@0rbz_) Update 12/30/2019 Removed hardcoded API key and Token, use input()...
A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA and WEP, Created...
This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage. To...
CreditsAuthor: M3n0sD0n4ldTwitter: @David_UtonDescription:GooFuzz is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information...
Naabu is a port scanning tool written in Go that allows you to enumerate valid ports for hosts in a...
Finding all things on-prem Microsoft for password spraying and enumeration. The tool will used a list of common subdomains associated...
Often a Red Team engagement is more than just achieving Domain Admin. Some clients will want to see if specific...
This repository is a Dockerized php application containing some XSS vulnerability challenges. The ideas behind challenges are: Javascript validation bypass...
The Vulnerable API (Based on OpenAPI 3) VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from...
Cervantes is an opensource collaborative platform for pentesters or red teams who want to save time to manage their projects,...
The idea of this project is to identify beacons which are unpacked at runtime or running in the context of...
In today's technological era, docker is the most powerful technology in each and every domain, whether it is Development, cyber...
This script scans every file from a given folder recursively, extracts every IPv4 and IPv6 address, filters out the public...
AWS Lambda is an event-driven, serverless computing platform provided by Amazon Web Services. It is a computing service that...
FrostByte Progolue: In the past few days I've been experimenting with the Steps to build Signed Shellcode Executable Pick any...
A burp suite extension that enumerates infrastructure and application Admin Interfaces. OWASP References: Classification: Web Application Security Testing > 02-Configuration...
A simple yet flexible cross-platform shell generator tool. Name: G(Great) Shell Description: A cross-platform shell generator tool that lets you...
GoReplay is an open-source network monitoring tool which can record your live Check latest documentation. Installation Download the latest binary...
Persistence by writing/reading shellcode from Event Log. Usage The SharpEventPersist tool takes 4 case-sensitive parameters: -file "C:pathtoshellcode.bin" -instanceid 1337 -source...
ConfluencePot is a simple honeypot for the Atlassian Confluence unauthenticated and remote OGNL injection vulnerability (CVE-2022-26134). About the vulnerability You...
DOMDig is a DOM XSS scanner that runs inside the Chromium web browser and it can scan single page applications...