Hackndo / misc
Tools I wrote for personal use in C, Python, Powershell, Bash, ...
☆46Updated 6 years ago
Alternatives and similar repositories for misc:
Users that are interested in misc are comparing it to the libraries listed below
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 4 years ago
- easy-to-use payload hosting☆269Updated 2 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆111Updated 5 years ago
- Ingest openldap data into bloodhound☆78Updated 4 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 2 years ago
- ☆36Updated 6 years ago
- Anti-reverse Compilation☆32Updated 4 years ago
- A repository of previous info-sec presentations I've presented.☆160Updated 5 months ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 6 months ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- ☆61Updated 8 months ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆121Updated 2 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆203Updated 7 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- Run commands on linux through those pesky firewalls☆26Updated 9 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated 2 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆137Updated 4 years ago
- Sustainable shellcode evasion☆108Updated 3 months ago