Projects for security students
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitatio…
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Depending on the configuration made by the infrastructure analyst, there are some ways to get past the 403-forbidden error generally by conf…
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Everything for pentest. | 渗透测试知识库,以 AI Agent 可执行的格式沉淀安全方法论。
ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating t…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
Active Directory Penetration Testing for Red Teams
Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust
This is the fastest way to get admin rights at work, school, etc., in just a few seconds.
Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.ed…
Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.
An Advanced Web Application Firewall that protects against threats like SQL injection and XSS by filtering HTTP traffic. It combines signatu…
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Bl…
Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Automated PowerHacker Suite: Your all-in-one solution for ethical hacking. Conduct comprehensive network mapping, vulnerability assessments,…
The ATT&CK Emulation Library includes a collection of adversary emulation plans used in published ATT&CK Evaluations.
PowerShell Obfuscator. A PowerShell script anti-virus evasion tool
[NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"