Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change…
A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains…
Decrypt Veeam database passwords. Needs to be run from an elevated context on the Veeam Backup/Database Server. I did not…
Nuclei templates for honeypots detection. This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot,…
This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined…
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…
On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…
The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers…
JSpector is a Burp Suite extension that passively crawls JavaScript files and automatically creates issues with URLs, endpoints and dangerous…
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later…