Extracting Credentials From Windows Logs
https://practicalsecurityanalytics.com/extracting-credentials-from-windows-logs
Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)
https://csa.limited/blog/20240916-Exploiting-Microsoft-Kernel-Applocker-Driver.html
NyxInvoke: is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features
https://github.com/BlackSnufkin/NyxInvoke
Attacking PowerShell CLIXML Deserialization
https://www.truesec.com/hub/blog/attacking-powershell-clixml-deserialization
This repository aims to help you mastering NetExec for your next pentest engagement by allowing you to build the workshop of your choice and experiment with it
https://github.com/Pennyw0rth/NetExec-Lab
From Amos to Poseidon | A SOC Team’s Guide to Detecting macOS Atomic Stealers 2024
https://www.sentinelone.com/blog/from-amos-to-poseidon-a-soc-teams-guide-to-detecting-macos-atomic-stealers-2024
The Art of Exploiting Active Directory from Linux
https://gatari.dev/posts/the-art-of-exploiting-ad-from-linux
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here
https://github.com/S3N4T0R-0X0/APT-Attack-Simulation
dynamic HTTP/s Payload Stager that automates updating decryption variables, saving time and effort in managing shellcode loaders
https://github.com/WafflesExploits/Dynamic-HTTP-Payload-Stager
Passworld is a fully customizable wordlist generator
https://github.com/SilvestriF3/Passworld
Python3 rewrite of AsOutsider features of AADInternals
https://github.com/synacktiv/AADOutsider-py
This BOF can be used to identify processes that hold handles to a given file. This can be useful to identify which process is locking a file on disk
https://github.com/Octoberfest7/enumhandles_BOF
EchoStrike is a tool designed to generate undetectable reverse shells and perform process injection on Windows systems
https://github.com/stivenhacker/EchoStrike
Revisiting MiniFilter Abuse Technique to Blind EDR
https://tierzerosecurity.co.nz/2024/09/18/blind-edr-revisited.html
PoC for CVE-2024-7965 This is the vulnerability in the V8 that occurs only within
https://github.com/bi-zone/CVE-2024-7965
CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection
https://github.com/horizon3ai/CVE-2024-8190
Introduction to Android Bytecode Exploitation (Part 1)
Fundamentals for Bytecode Exploitation (Part 2)
Bytecode Injection (Part 3)
Bytecode Reuse Attack (Part 4)
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine
https://github.com/S3N4T0R-0X0/BEAR
Windows Hyper-V Elevation of Privilege Vulnerability
https://github.com/pwndorei/CVE-2024-38127
Exploit for Veeam backup and Replication Pre-Auth Deserialization CVE-2024-40711
https://github.com/watchtowrlabs/CVE-2024-40711
Acquiring Malicious Browser Extension Samples on a Shoestring Budget
https://pberba.github.io/crypto/2024/09/14/malicious-browser-extension-genesis-market
XSSpector: A powerful tool for detecting XSS vulnerabilities in web apps. Advanced detection, customizable payloads, proxy support, and cookie management
https://github.com/Vigrahak/XSSpector
Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode
https://github.com/Dump-GUY/EXE-or-DLL-or-ShellCode
Loading BOF & ShellCode without executable permission
https://github.com/HackerCalico/No_X_BOF-ShellCode
Analyse MSI files for vulnerabilities
https://github.com/CICADA8-Research/MyMSIAnalyzer
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out
https://github.com/shaddy43/BrowserSnatch
Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, and install AnyDesk for persistent remote access
https://github.com/alexdhital/Infiltrax
Dump Kerberos tickets from the KCM database of SSSD
https://github.com/synacktiv/kcmdump