This repository serves as a collection of public UAC bypass techniques that have been weaponized as BOFs. A single module…
A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file…
A versatile bash script designed for automating Active Directory enumeration and vulnerability assessment. By leveraging a curated selection of tools…
We delve into the hierarchy of WDAC rule levels, ranging from the most secure to the least secure, providing insight…
A groundbreaking tool revolutionizing Active Directory reconnaissance for Red Teams. By leveraging the obscure Active Directory Web Services (ADWS) protocol,…
Delve into the realm of network security with MinDNS, a lightweight DNS server crafted in Rust. Designed for versatility, it…
A formidable tool tailored for both dropper and post-exploitation scenarios on Windows systems. With its sophisticated capabilities including dynamic syscall…
Bypassing Memory Scanners The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory…
Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This threat is…
This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident…