Hacking
Hide memory artifacts using ROP and hardware breakpoints.
Inject a shellcode in a remote process using Process Hollowing.
A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.
A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022
HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.
Red Teaming Tactics and Techniques
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Kraken, a modular multi-language webshell coded by @secu_x11
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gatheri…
Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on unknown cipher text and key dictionnary
Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.
The mighty, self-hostable Git server for the command line🍦
LSASS memory dumper using direct system calls and API unhooking.
J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications.