Machine-readable .txt IP blocklist from ThreatFox by Abuse.ch, updated every hour.
This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals…
A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
Decentralised P2P botnet using toxcore.
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!
a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM
Hello, aspiring hackers! 🕵️‍♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absolutel…
A list of 350+ free TryHackMe roomsđź’» to kick off your cybersecurity learning, organized by topics for easy exploration and practical skill-b…
Shell script to check for simple privilege escalation vectors on Unix systems. Checks file permissions, sudo rights, SUID binaries, cron job…
Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution
A Visual Studio Code Extension agent for Mythic C2
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality wi…
Adversary simulation and Red teaming platform with AI
Extract Windows credentials directly from VM memory snapshots and virtual disks
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used again…
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
A Golang implant that uses Discord as a C2 team server
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with v…
Windows Local Privilege Escalation Cookbook
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribution…
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
Automation for internal Windows Penetrationtest / AD-Security
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).