Windows Privilege Escalation from User to Domain Admin.
https://github.com/antonioCoco/RemotePotato0/releases/tag/0.1
#Windows #PE #RPC
https://github.com/antonioCoco/RemotePotato0/releases/tag/0.1
#Windows #PE #RPC
GitHub
Release RemotePotato0 · antonioCoco/RemotePotato0
RemotePotato0
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
Full details at --> https://labs.sentinelone.com/relaying-potatoes-dce-rpc-ntlm-relay...
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
Full details at --> https://labs.sentinelone.com/relaying-potatoes-dce-rpc-ntlm-relay...
This is a collection of C# tooling and POCs I've created for use on operations. Each project is designed to use no external libraries. Open each project's .SLN in Visual Studio and compile as "Release".
از این ابزارها می تونید برای post exploit استفاده کنید خوبیش اینکه کد به صورتی زده که dll اضافی نیاز نداره
https://github.com/matterpreter/OffensiveCSharp
#offensivecsharp #readteaming #hackingtools
از این ابزارها می تونید برای post exploit استفاده کنید خوبیش اینکه کد به صورتی زده که dll اضافی نیاز نداره
https://github.com/matterpreter/OffensiveCSharp
#offensivecsharp #readteaming #hackingtools
GitHub
GitHub - matterpreter/OffensiveCSharp: Collection of Offensive C# Tooling
Collection of Offensive C# Tooling. Contribute to matterpreter/OffensiveCSharp development by creating an account on GitHub.
Online & Hosted Reverse Shell Generator
===========================
https://www.revshells.com/
https://github.com/0dayCTF/reverse-shell-generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Features:
- Generate common listeners and reverse shells
- Raw mode to cURL shells to your machine.
- Button to increment the listening port number by 1
- URI and Base64 encoding
- LocalStorage to persist your configuration
#reverseshell #CTF
===========================
https://www.revshells.com/
https://github.com/0dayCTF/reverse-shell-generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Features:
- Generate common listeners and reverse shells
- Raw mode to cURL shells to your machine.
- Button to increment the listening port number by 1
- URI and Base64 encoding
- LocalStorage to persist your configuration
#reverseshell #CTF
Revshells
Online - Reverse Shell Generator
Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode. Great for CTFs.
h4ck
1)fortune: random IPs scanner/generator
2)netbat : hosts + ports scanner, supports host list (+CIDR)
3)rtsp_brute: fuzz&brute rtsp cameras
4)vpn: connect to VPN server using openvpn
5)webmap: Scan web application for CMS, used techs, vulns (file, dir fuzz)
https://github.com/fagcinsk/h4ck
#scanner #fuzzer #redteam
1)fortune: random IPs scanner/generator
2)netbat : hosts + ports scanner, supports host list (+CIDR)
3)rtsp_brute: fuzz&brute rtsp cameras
4)vpn: connect to VPN server using openvpn
5)webmap: Scan web application for CMS, used techs, vulns (file, dir fuzz)
https://github.com/fagcinsk/h4ck
#scanner #fuzzer #redteam
GitHub
GitHub - fagci/h4ck: Hacking tools written by me. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.
Hacking tools written by me. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more. - GitHub - fagci/h4ck: Hacking tools written by me. IP fortune, webmap -- web vulns scanner, rtsp br...
OWASP Risk Assessment Calculator
source :
https://github.com/JavierOlmedo/OWASP-Calculator
online :
https://javierolmedo.github.io/OWASP-Calculator/
https://security-net.biz/files/owaspriskcalc.html
#owasp #Assessment #risk
source :
https://github.com/JavierOlmedo/OWASP-Calculator
online :
https://javierolmedo.github.io/OWASP-Calculator/
https://security-net.biz/files/owaspriskcalc.html
#owasp #Assessment #risk
GitHub
GitHub - JavierOlmedo/OWASP-Calculator: 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment
🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment - JavierOlmedo/OWASP-Calculator
C2 Powershell Command & Control Framework with BuiltIn Commands
کلیه ابزارهای تست نفوذ در قالب اسکریپت ها و ماژول های پاورشل برای بایپس آنتی ویروس
https://github.com/r00t-3xp10it/meterpeter
https://github.com/r00t-3xp10it/meterpeter/releases/tag/v2.10.8
#AMSI #powershell #FUD
کلیه ابزارهای تست نفوذ در قالب اسکریپت ها و ماژول های پاورشل برای بایپس آنتی ویروس
https://github.com/r00t-3xp10it/meterpeter
https://github.com/r00t-3xp10it/meterpeter/releases/tag/v2.10.8
#AMSI #powershell #FUD
GitHub
GitHub - r00t-3xp10it/meterpeter: C2 Powershell Command & Control Framework with BuiltIn Commands
C2 Powershell Command & Control Framework with BuiltIn Commands - r00t-3xp10it/meterpeter
kraker
is a distributed password brute-force system that focused on easy use.
https://github.com/zzzteph/kraker
#bruteforce #kraker #docker
is a distributed password brute-force system that focused on easy use.
https://github.com/zzzteph/kraker
#bruteforce #kraker #docker
GitHub
GitHub - zzzteph/kraker: Kraker is a distributed password brute-force system that focused on easy use.
Kraker is a distributed password brute-force system that focused on easy use. - GitHub - zzzteph/kraker: Kraker is a distributed password brute-force system that focused on easy use.
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
https://github.com/mvt-project/mvt
#android #ios #forensic
https://github.com/mvt-project/mvt
#android #ios #forensic
GitHub
GitHub - mvt-project/mvt: MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find…
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise. - mvt-project/mvt
Cobalt Strike Beacon Object File (BOF) that takes the name of of a PE file as an argument and spawns the process in a suspended state
https://github.com/boku7/bof-spawnSuspendedProcess
#cobaltstrike
https://github.com/boku7/bof-spawnSuspendedProcess
#cobaltstrike
GitHub
GitHub - boku7/spawn: Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built…
Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC...
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw function.
https://github.com/topotam/PetitPotam
#EFS #Windows
https://github.com/topotam/PetitPotam
#EFS #Windows
GitHub
GitHub - topotam/PetitPotam: PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw…
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions. - topotam/PetitPotam
Meet Mushikago
=============
https://github.com/PowderKegTech/mushikago
Mushikago uses game AI technology to select and execute the most appropriate test content based on the environment in spot. The application of game AI technology to security products is new, and our work has shown that game AI is most suitable for penetration testing, where the content needs to change depending on the environment. In addition, Mushikago can automatically perform penetration testing in mixed environments of IT and OT(ICS), and can visualize and report the acquired device, account, and network information. The test contents are also displayed in a format consistent with MITRE ATT&CK. This allows the user to perform penetration testing at a certain level without manual intervention.
Features:
- Full Automatic penetration testing tool
- Device detection
- IT penetration testing
- ICS penetration testing
#penetrationtesting #pentesting #automation #ai #ics
=============
https://github.com/PowderKegTech/mushikago
Mushikago uses game AI technology to select and execute the most appropriate test content based on the environment in spot. The application of game AI technology to security products is new, and our work has shown that game AI is most suitable for penetration testing, where the content needs to change depending on the environment. In addition, Mushikago can automatically perform penetration testing in mixed environments of IT and OT(ICS), and can visualize and report the acquired device, account, and network information. The test contents are also displayed in a format consistent with MITRE ATT&CK. This allows the user to perform penetration testing at a certain level without manual intervention.
Features:
- Full Automatic penetration testing tool
- Device detection
- IT penetration testing
- ICS penetration testing
#penetrationtesting #pentesting #automation #ai #ics
GitHub
GitHub - PowderKegTech/mushikago: an automatic penetration testing tool
an automatic penetration testing tool. Contribute to PowderKegTech/mushikago development by creating an account on GitHub.
A collection of Hacker API tools utilizing the HackerOne API. To build your own Hacker API integration have a look at our getting started docs.
https://github.com/Hacker0x01/awesome-hacker-api-tools
#hackerone #apitools
https://github.com/Hacker0x01/awesome-hacker-api-tools
#hackerone #apitools
Beaconator
A beacon generator using Cobalt Strike and PEzor.
https://github.com/capt-meelo/Beaconator
A beacon generator using Cobalt Strike and PEzor.
https://github.com/capt-meelo/Beaconator
GitHub
GitHub - capt-meelo/Beaconator: A beacon generator using Cobalt Strike and a variety of tools.
A beacon generator using Cobalt Strike and a variety of tools. - capt-meelo/Beaconator
Request smuggler
Http request smuggling vulnerability scanner
https://github.com/sh1yo/request_smuggler
HTTP Desync Attacks: Request Smuggling Reborn
https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
#request_smuggler
Http request smuggling vulnerability scanner
https://github.com/sh1yo/request_smuggler
HTTP Desync Attacks: Request Smuggling Reborn
https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
#request_smuggler
GitHub
GitHub - Sh1Yo/request_smuggler: Http request smuggling vulnerability scanner
Http request smuggling vulnerability scanner. Contribute to Sh1Yo/request_smuggler development by creating an account on GitHub.
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
https://github.com/MythicAgents/Medusa
#c2 #python #medusa
https://github.com/MythicAgents/Medusa
#c2 #python #medusa
GitHub
GitHub - MythicAgents/Medusa: Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic - MythicAgents/Medusa
ShellShockHunter
Scan via Shodan search engine then try figure out Vulnerable or not
https://github.com/MrCl0wnLab/ShellShockHunter
#ShellShockHunter
Scan via Shodan search engine then try figure out Vulnerable or not
https://github.com/MrCl0wnLab/ShellShockHunter
#ShellShockHunter
GitHub
GitHub - MrCl0wnLab/ShellShockHunter: It's a simple tool for test vulnerability shellshock
It's a simple tool for test vulnerability shellshock - MrCl0wnLab/ShellShockHunter
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
https://github.com/BullsEye0/ghost_eye
#Ghost_eye #informationGathering
https://github.com/BullsEye0/ghost_eye
#Ghost_eye #informationGathering
GitHub
GitHub - BullsEye0/ghost_eye: Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information…
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye ...
#Exegol is a fully featured and community-driven hacking environment
It can be used in pentest engagements, #bugbounty, #CTF, #HackTheBox, #OSCP lab & exam and so on. Exegol's original fate was to be a ready-to-hack docker in case of emergencies during engagements.
https://github.com/ShutdownRepo/Exegol
It can be used in pentest engagements, #bugbounty, #CTF, #HackTheBox, #OSCP lab & exam and so on. Exegol's original fate was to be a ready-to-hack docker in case of emergencies during engagements.
https://github.com/ShutdownRepo/Exegol
GitHub
GitHub - ThePorgs/Exegol: Fully featured and community-driven hacking environment
Fully featured and community-driven hacking environment - ThePorgs/Exegol
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
https://github.com/HuskyHacks/ShadowSteal
#LPE
https://github.com/HuskyHacks/ShadowSteal
#LPE
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal