Exploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions Exploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions Reviewed by Zion3R on 8:30 AM Rating: 5
Ventoy - A New Bootable USB Solution Ventoy - A New Bootable USB Solution Reviewed by Zion3R on 5:30 PM Rating: 5
Injector - Complete Arsenal Of Memory Injection And Other Techniques For Red-Teaming In Windows Injector - Complete Arsenal Of Memory Injection And Other Techniques For Red-Teaming In Windows Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Whisker - A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute Whisker - A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute Reviewed by Zion3R on 5:30 PM Rating: 5
DcRat - A Simple Remote Tool Written In C# DcRat - A Simple Remote Tool Written In C# Reviewed by Zion3R on 5:30 PM Rating: 5
RemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From User To Domain Admin RemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From User To Domain Admin Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
Security Scorecards - Security Health Metrics For Open Source Security Scorecards - Security Health Metrics For Open Source Reviewed by Zion3R on 5:30 PM Rating: 5
WFH - Windows Feature Hunter WFH - Windows Feature Hunter Reviewed by Zion3R on 8:30 AM Rating: 5
FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles Reviewed by Zion3R on 5:30 PM Rating: 5
Backstab - A Tool To Kill Antimalware Protected Processes Backstab - A Tool To Kill Antimalware Protected Processes Reviewed by Zion3R on 8:30 AM Rating: 5
DarkLoadLibrary - LoadLibrary For Offensive Operations DarkLoadLibrary - LoadLibrary For Offensive Operations Reviewed by Zion3R on 5:30 PM Rating: 5
Squalr - Squalr Memory Editor - Game Hacking Tool Written In C# Squalr - Squalr Memory Editor - Game Hacking Tool Written In C# Reviewed by Zion3R on 5:30 PM Rating: 5
RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps Reviewed by Zion3R on 8:30 AM Rating: 5
NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation Reviewed by Zion3R on 5:30 PM Rating: 5
FalconEye - Real-time detection software for Windows process injections FalconEye - Real-time detection software for Windows process injections Reviewed by Zion3R on 5:30 PM Rating: 5
Rustcat - Netcat Alternative Rustcat - Netcat Alternative Reviewed by Zion3R on 8:30 AM Rating: 5
PPLdump - Dump The Memory Of A PPL With A Userland Exploit PPLdump - Dump The Memory Of A PPL With A Userland Exploit Reviewed by Zion3R on 5:30 PM Rating: 5
TChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine TChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine Reviewed by Zion3R on 5:30 PM Rating: 5
Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS Reviewed by Zion3R on 5:30 PM Rating: 5
BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D Reviewed by Zion3R on 8:30 AM Rating: 5