Proof of concept WMI virus. Does what it looks like it does. Virus isn't stored on the filsystem (in any way an AV would detect), but within the WMI. Contains PoC code for extracting it from the WMI- which can also be achieved at boot from within the WMI itself using powershell. So, self-extracting WMI virus that never touches the disk.
https://github.com/pulpocaminante/Stuxnet
https://github.com/pulpocaminante/Stuxnet
GitHub
GitHub - pulpocaminante/Stuxnet: WMI virus, because funny
WMI virus, because funny. Contribute to pulpocaminante/Stuxnet development by creating an account on GitHub.
https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-1/
https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-2/
https://github.com/ionescu007/clfs-docs
https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-2/
https://github.com/ionescu007/clfs-docs
hn security
CVE-2024-49138 Windows CLFS heap-based buffer overflow analysis - Part 1 - hn security
CVE-2024-49138 is a Windows vulnerability detected […]
https://github.com/RedTeamPentesting/pretender
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing
GitHub
GitHub - RedTeamPentesting/pretender: Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR…
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing. - RedTeamPentesting/pretender
Tired of using ts::multirdp, because Mimikatz is a nogo nowadays and get's flagged anyway most of the time? 🧐
Well, here is a standalone patching implementation with Win11 support:
Easy to port to a BOF/Coff🤠🔥
https://gist.github.com/S3cur3Th1sSh1t/8294ec59d1ef38cba661697edcfacb9b
https://x.com/ShitSecure/status/1887519686251676034
Well, here is a standalone patching implementation with Win11 support:
Easy to port to a BOF/Coff🤠🔥
https://gist.github.com/S3cur3Th1sSh1t/8294ec59d1ef38cba661697edcfacb9b
https://x.com/ShitSecure/status/1887519686251676034
Gist
tspatch.c
GitHub Gist: instantly share code, notes, and snippets.
DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!
https://github.com/splunk/DECEIVE
https://github.com/splunk/DECEIVE
GitHub
GitHub - splunk/DECEIVE: DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot…
DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work! - splunk/DECEIVE
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
https://github.com/Sh3lldon/FullBypass
https://github.com/Sh3lldon/FullBypass
GitHub
GitHub - Sh3lldon/FullBypass: A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language…
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. - Sh3lldon/FullBypass
A PowerShell console in C/C++ with all the security features disabled
https://github.com/scrt/PowerChell
https://github.com/scrt/PowerChell
GitHub
GitHub - scrt/PowerChell: A PowerShell console in C/C++ with all the security features disabled
A PowerShell console in C/C++ with all the security features disabled - scrt/PowerChell
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive data in LSASS memory.
https://github.com/Offensive-Panda/ShadowDumper
https://github.com/Offensive-Panda/ShadowDumper
GitHub
GitHub - Offensive-Panda/ShadowDumper: Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration…
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da...
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
https://github.com/DarkSpaceSecurity/RunAs-Stealer
https://github.com/DarkSpaceSecurity/RunAs-Stealer
GitHub
GitHub - DarkSpaceSecurity/RunAs-Stealer: RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW…
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging - DarkSpaceSecurity/RunAs-Stealer
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
https://github.com/BlackSnufkin/LitterBox
https://github.com/BlackSnufkin/LitterBox
GitHub
GitHub - BlackSnufkin/LitterBox: A secure sandbox environment for malware developers and red teamers to test payloads against detection…
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil...
KrbRelayEx-RPC is a tool similar to my KrbRelayEx designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets.
Listens for authenticated ISystemActivator requests and extracts the AP-REQ tickets
Extracts dynamic port bindings from EPMAPPER/OXID resolutions
Relay the AP-REQ to access SMB shares or HTTP ADCS (Active Directory Certificate Services) on behalf of the victim
Forwards the victim's requests dynamically and transparently to the real destination RPC/DCOM application so the victim is unaware that their requests are being intercepted and relayed
https://github.com/decoder-it/KrbRelayEx-RPC
Listens for authenticated ISystemActivator requests and extracts the AP-REQ tickets
Extracts dynamic port bindings from EPMAPPER/OXID resolutions
Relay the AP-REQ to access SMB shares or HTTP ADCS (Active Directory Certificate Services) on behalf of the victim
Forwards the victim's requests dynamically and transparently to the real destination RPC/DCOM application so the victim is unaware that their requests are being intercepted and relayed
https://github.com/decoder-it/KrbRelayEx-RPC
GitHub
GitHub - decoder-it/KrbRelayEx-RPC
Contribute to decoder-it/KrbRelayEx-RPC development by creating an account on GitHub.
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
https://cti.monster/blog/2025/03/18/CVE-2025-24071.html
https://github.com/0x6rss/CVE-2025-24071_PoC
https://cti.monster/blog/2025/03/18/CVE-2025-24071.html
https://github.com/0x6rss/CVE-2025-24071_PoC
0x6rss
CVE-2025-24071: NTLM Hash Leak
Technical explanation of NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
Apache Tomcat (CVE-2025-24813)
https://github.com/iSee857/CVE-2025-24813-PoC/tree/main
https://github.com/iSee857/CVE-2025-24813-PoC/tree/main
GitHub
GitHub - iSee857/CVE-2025-24813-PoC: Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)
Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813). Contribute to iSee857/CVE-2025-24813-PoC development by creating an account on GitHub.
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.
https://github.com/tclahr/uac
https://github.com/tclahr/uac
GitHub
GitHub - tclahr/uac: UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts…
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of U...
Experience the next level of tunneling with the new Ligolo-ng GUI version, designed to make your operations more seamless and efficient:
✅ Automatic TUN Management – Streamline tunnel setup without manual configuration.
✅ Unlimited Concurrent Relays – Handle multiple relays simultaneously without limitations.
✅ SOCKS and HTTP Proxy Support – Flexible proxying options to adapt to various network conditions.
✅ Loopback Routing to Target Machine – Directly route to the target's loopback without needing port forwarding.
✅ Independent Listeners as Redirectors – Create separate, adaptable listeners for greater control.
✅ Dynamic mTLS-Enabled Agent Generation – Generate obfuscated agent binaries on the fly with mTLS support.
✅ Simplified Certificate Management – Easy-to-manage certificates for secure communication.
✅ Intuitive Terminal-Based GUI – Clean and user-friendly interface for better command and control.
https://github.com/ttpreport/ligolo-mp
✅ Automatic TUN Management – Streamline tunnel setup without manual configuration.
✅ Unlimited Concurrent Relays – Handle multiple relays simultaneously without limitations.
✅ SOCKS and HTTP Proxy Support – Flexible proxying options to adapt to various network conditions.
✅ Loopback Routing to Target Machine – Directly route to the target's loopback without needing port forwarding.
✅ Independent Listeners as Redirectors – Create separate, adaptable listeners for greater control.
✅ Dynamic mTLS-Enabled Agent Generation – Generate obfuscated agent binaries on the fly with mTLS support.
✅ Simplified Certificate Management – Easy-to-manage certificates for secure communication.
✅ Intuitive Terminal-Based GUI – Clean and user-friendly interface for better command and control.
https://github.com/ttpreport/ligolo-mp
ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients.
https://github.com/LaurieWired/GhidraMCP
https://github.com/LaurieWired/GhidraMCP
IDA Pro MCP
https://github.com/mrexodia/ida-pro-mcp
sample crackme:
https://github.com/NoraCodes/crackmes
https://github.com/mrexodia/ida-pro-mcp
sample crackme:
https://github.com/NoraCodes/crackmes
GitHub
GitHub - mrexodia/ida-pro-mcp: AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP. - mrexodia/ida-pro-mcp