Skip to content
View 0lston's full-sized avatar

Block or report 0lston

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments

PowerShell 396 62 Updated Jan 29, 2025

This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC architecture.

655 172 Updated Sep 23, 2024

Basics on commands/tools/info on how to assess the security of mobile applications

1,530 240 Updated Dec 19, 2023

A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.

239 15 Updated Feb 24, 2025

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 436 74 Updated Nov 19, 2024

Programming course for Wannabes

C 36 10 Updated Jan 26, 2025

The challenges I created for AKASEC CTF 2024

1 Updated Jun 10, 2024

A collection of ctf challenges based on Rareskills educational content

Solidity 36 3 Updated Jan 4, 2025

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…

Python 487 93 Updated Feb 14, 2025

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

5,910 1,245 Updated Oct 4, 2024

An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.

587 82 Updated Apr 4, 2023

Django styleguide used in HackSoft projects

Python 5,325 542 Updated Feb 19, 2025

A command and control (C2) server

Python 56 16 Updated Jul 5, 2024

This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showcasing the implementation and comparison of different machine …

Jupyter Notebook 40 9 Updated Oct 19, 2023

PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html

Jupyter Notebook 120 59 Updated Sep 8, 2020

Algorithm and data structure articles for https://cp-algorithms.com (based on http://e-maxx.ru)

C++ 8,270 1,681 Updated Jan 29, 2025

Fifth cohort of Ethereum Protocol Fellowship

86 80 Updated Feb 22, 2025

Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.

Go 912 158 Updated Jun 1, 2021

Collection of terraform codes for various Azure network topologies.

HCL 89 47 Updated Dec 11, 2024

An NTFS/FAT parser for digital forensics & incident response

Python 198 30 Updated Nov 7, 2024

Forensics tool for NTFS (parser, mft, bitlocker, deleted files)

C++ 499 100 Updated Jul 23, 2023

NTFS filesystem parser

Python 9 2 Updated Mar 10, 2019

The recursive internet scanner for hackers. 🧡

Python 7,996 616 Updated Feb 25, 2025

how to look for Leaked Credentials !

791 99 Updated May 6, 2024

All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs

7 1 Updated Nov 21, 2022

A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.

C# 653 119 Updated May 15, 2024

Android 14 kernel exploit for Pixel7/8 Pro

C++ 488 73 Updated Apr 23, 2024
C++ 18 5 Updated Jan 9, 2025

HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy‌ + Exploit Timing Attacks

Python 167 10 Updated Nov 5, 2024
Next