Lists (6)
Sort Name ascending (A-Z)
0x696e7472617461626c65
Anti-Forense
Bug Bounty && Web Pentesting
Forenze
Tools, resources and techniques learned by my own and from the FDP courseOSINT
Red Teaming
Tools, examples and more about Red Team operations (e.g. shellcode injection, persistence, bypassing...)Stars
Use StyleGAN2 & First Order Motion Model to Generate and Animate faces with Deep Learning for hypothetical use case of the Netflix Platform.
Custom scan profiles for use with Burp Suite Pro
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
These are my checklists which I use during my hunting.
RDP web client with Golang backend for proxy connection to Windows machine
automates the setup and configuration of a VPS for web services.
automatically fetches shortened URLs from multiple services
Telegram report automatize | sessions | scraping web | smtp
Shellcode loader with evasion capabilities written in Nim
OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once installed we will have remote administrative access to our target t…
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
"Email Spoofing App is a tool for sending emails with a spoofed sender address and name. Features include HTML templates, attachments. For educational purposes only.
Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...
✉️ HTML Smuggling generator&obfuscator for your Red Team operations
Automated wifi deauthenticator of clients using MDK3.
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Powerful yet simple to use screenshot software 🖥️ 📸