SleepTheGod / Windows
Windows And Ways To Break It
☆100Updated 11 months ago
Related projects: ⓘ
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆83Updated 2 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆97Updated last year
- ☆189Updated this week
- ☆101Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆127Updated last week
- A shellcode injection tool showcasing various process injection techniques☆133Updated 9 months ago
- ☆119Updated last month
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆54Updated last year
- ☆222Updated this week
- quick and dirty proof-of-concept to hide shells in images☆48Updated 2 months ago
- Red Teaming tools and techniques☆45Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated last year
- Red Team Guides☆134Updated 8 months ago
- A C2 framework built for my bachelors thesis☆51Updated 2 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆63Updated 9 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆148Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆50Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆144Updated 4 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆151Updated 6 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 11 months ago
- Offensive Lua.☆174Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆37Updated this week
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆122Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.☆73Updated 8 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆176Updated 4 months ago
- Different methods to get current username without using whoami☆170Updated 7 months ago
- Everything and anything related to password spraying☆122Updated 4 months ago
- ☆56Updated this week
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated 10 months ago