RDPHijack-BOF : Perform Local/Remote RDP Session Hijacking

2 years ago

Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. With a valid access…

TeamFiltration : Cross-Platform Framework For Enumerating, Spraying, Exfiltrating, And Backdooring O365 AAD Accounts

2 years ago

TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts. See the TeamFiltration wiki page for…

Prefetch-Hash-Cracker : A Small Util To Brute-Force Prefetch Hashes

2 years ago

During the forensic analysis of a Windows machine, you may find the name of a deleted prefetch(Prefetch-Hash-Cracker) file. While its…

Appshark : Static Taint Analysis Platform To Scan Vulnerabilities In An Android App

2 years ago

Appshark is a static taint analysis platform to scan vulnerabilities in an Android app. Prerequisites Appshark requires a specific version…

VuCSA : Vulnerable Client-Server Application – Made For Learning/Presenting

2 years ago

Vulnerable client-server application (VuCSA) is made for learning/presenting how to perform penetration tests of non-http thick clients. It is written…

Jscythe : Force Any Node.Js/Electron/V8 Based Process To Execute Arbitrary Javascript Code

2 years ago

Jscythe abuses the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code, even…

Cicd-Goat : A Deliberately Vulnerable CI/CD Environment

2 years ago

The CI/CD-Goat project allows engineers and security practitioners to learn and practice CI/CD security through a set of 10 challenges,…

Reverse_SSH : SSH Based Reverse Shell

2 years ago

Want to use SSH for reverse shells? Now you can using reverse_SSH. Manage and connect to reverse shells with native…

Ermir : An Evil Java RMI Registry

2 years ago

Ermir is an Evil/Rogue RMI Registry, it exploits unsecure deserialization on any Java code calling standard RMI methods on it…

Threatest : Threatest Is A Go Framework For End-To-End Testing Threat Detection Rules

2 years ago

Threatest is a Go framework for testing threat detection end-to-end. Threatest allows you to detonate an attack technique, and verify…