Skip to content
View seriotonctf's full-sized avatar

Block or report seriotonctf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

An intuitive query API for IDA Pro

Python 123 4 Updated Dec 25, 2024

Collection of hacked-together scripts to integrate some HTB goodness into your Discord server.

Python 3 1 Updated Dec 4, 2024

Repo for talk slides & materials

14 Updated Nov 22, 2024

Python implementation of GhostPack's Seatbelt situational awareness tool

Python 232 16 Updated Nov 12, 2024

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 388 64 Updated Nov 19, 2024

goopts, a Go library to parse arguments given in command line to a program.

Go 8 Updated Nov 14, 2024

.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation

C# 251 28 Updated Nov 3, 2024

A Python POC for CRED1 over SOCKS5

Python 137 11 Updated Oct 5, 2024

The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that di…

Python 27 5 Updated Dec 17, 2024

Internal Port Scanner for Squid Proxy

Go 4 1 Updated Nov 29, 2024

ysoserial.net docker image

Shell 28 5 Updated Sep 23, 2024

CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done

C 606 47 Updated Oct 29, 2024

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…

C++ 495 83 Updated Jun 12, 2024

crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names from certificates. Perfect for security researchers and develope…

Go 21 2 Updated Jun 22, 2024

Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.

Python 180 5 Updated Oct 8, 2024

The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes

Assembly 30,862 4,402 Updated Apr 25, 2024

MemProcFS

C 3,244 397 Updated Dec 18, 2024

Windows kernel and user mode emulation.

Python 1,545 234 Updated Apr 12, 2024

🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

C++ 45,603 1,985 Updated Dec 28, 2024
HCL 87 7 Updated Dec 27, 2024

bypass-url-parser

Python 1,049 112 Updated Dec 21, 2024

Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.

C# 35 2 Updated Nov 29, 2024

A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.

C# 647 116 Updated May 15, 2024

Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials used in remote desktop sessions.

C# 14 2 Updated Feb 22, 2024

📚 Collaborative cheatsheets for console commands

Markdown 52,325 4,279 Updated Dec 28, 2024

This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".

2,269 465 Updated Nov 16, 2024

From Zero To Hero

Shell 26 10 Updated Sep 11, 2024
Next