Stars
Collection of hacked-together scripts to integrate some HTB goodness into your Discord server.
Python implementation of GhostPack's Seatbelt situational awareness tool
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
goopts, a Go library to parse arguments given in command line to a program.
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that di…
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names from certificates. Perfect for security researchers and develope…
Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.
The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials used in remote desktop sessions.
📚 Collaborative cheatsheets for console commands
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".