Yeeb1 / shelf
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆27Updated last week
Related projects ⓘ
Alternatives and complementary repositories for shelf
- Everything and anything related to password spraying☆126Updated 5 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 7 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆86Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆165Updated last week
- C2 Infrastructure Automation☆86Updated last week
- ☆134Updated 3 weeks ago
- Lab used for workshop and CTF☆153Updated 3 weeks ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆137Updated 5 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆111Updated 2 weeks ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆75Updated last week
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆144Updated this week
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆108Updated last week
- some of the commands I usually use when doing HTB machines☆37Updated 10 months ago
- linikatz is a tool to attack AD on UNIX☆137Updated last year
- ☆99Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆259Updated last year
- Different methods to get current username without using whoami☆172Updated 9 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆123Updated last month
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆197Updated last week
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆190Updated 5 months ago
- ☆53Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆146Updated 6 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆201Updated 2 weeks ago
- ☆48Updated last week
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆156Updated 2 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆162Updated last month
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆164Updated 3 months ago
- ☆176Updated last month