Octopus - Open Source Pre-Operation C2 Server Based On Python And Powershell Octopus - Open Source Pre-Operation C2 Server Based On Python And Powershell Reviewed by Zion3R on 8:30 AM Rating: 5
EDRSandblast - Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And LSASS Protections EDRSandblast - Tool That Weaponize A Vulnerable Signed Driver To Bypass EDR Detections And LSASS Protections Reviewed by Zion3R on 8:30 AM Rating: 5
Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
SysWhispers3 - AV/EDR Evasion Via Direct System Calls SysWhispers3 - AV/EDR Evasion Via Direct System Calls Reviewed by Zion3R on 5:30 PM Rating: 5
Litefuzz - A Multi-Platform Fuzzer For Poking At Userland Binaries And Servers Litefuzz - A Multi-Platform Fuzzer For Poking At Userland Binaries And Servers Reviewed by Zion3R on 8:30 AM Rating: 5
DRAKVUF Sandbox - Automated Hypervisor-Level Malware Analysis System DRAKVUF Sandbox - Automated Hypervisor-Level Malware Analysis System Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
Win-Brute-Logon - Crack Any Microsoft Windows Users Password Without Any Privilege (Guest Account Included) Win-Brute-Logon - Crack Any Microsoft Windows Users Password Without Any Privilege (Guest Account Included) Reviewed by Zion3R on 8:30 AM Rating: 5
Shellcode-Encryptor - A Simple Shell Code Encryptor/Decryptor/Executor To Bypass Anti Virus Shellcode-Encryptor - A Simple Shell Code Encryptor/Decryptor/Executor To Bypass Anti Virus Reviewed by Zion3R on 5:30 PM Rating: 5
Lsarelayx - NTLM Relaying For Windows Made Easy Lsarelayx - NTLM Relaying For Windows Made Easy Reviewed by Zion3R on 5:30 PM Rating: 5
DLLHijackingScanner - This Is A PoC For Bypassing UAC Using DLL Hijacking And Abusing The "Trusted Directories" Verification DLLHijackingScanner - This Is A PoC For Bypassing UAC Using DLL Hijacking And Abusing The "Trusted Directories" Verification Reviewed by Zion3R on 8:30 AM Rating: 5
OffensiveRust - Rust Weaponization For Red Team Engagements OffensiveRust - Rust Weaponization For Red Team Engagements Reviewed by Zion3R on 8:30 AM Rating: 5
DetectionLabELK - A Fork From DetectionLab With ELK Stack Instead Of Splunk DetectionLabELK - A Fork From DetectionLab With ELK Stack Instead Of Splunk Reviewed by Zion3R on 5:30 PM Rating: 5
Canadian Furious Beaver - A Tool For Monitoring IRP Handler In Windows Drivers, And Facilitating The Process Of Analyzing, Replaying And Fuzzing Windows Drivers For Vulnerabilities Canadian Furious Beaver - A Tool For Monitoring IRP Handler In Windows Drivers, And Facilitating The Process Of Analyzing, Replaying And Fuzzing Windows Drivers For Vulnerabilities Reviewed by Zion3R on 5:30 PM Rating: 5
Ad-Honeypot-Autodeploy - Deploy A Small, Intentionally Insecure, Vulnerable Windows Domain For RDP Honeypot Fully Automatically Ad-Honeypot-Autodeploy - Deploy A Small, Intentionally Insecure, Vulnerable Windows Domain For RDP Honeypot Fully Automatically Reviewed by Zion3R on 5:30 PM Rating: 5
HandleKatz - PIC Lsass Dumper Using Cloned Handles HandleKatz - PIC Lsass Dumper Using Cloned Handles Reviewed by Zion3R on 8:30 AM Rating: 5
aDLL - Adventure of Dinamic Link Library aDLL - Adventure of Dinamic Link Library Reviewed by Zion3R on 8:30 AM Rating: 5
Concealed Position - Bring Your Own Print Driver Privilege Escalation Tool Concealed Position - Bring Your Own Print Driver Privilege Escalation Tool Reviewed by Zion3R on 8:30 AM Rating: 5
Ntlm_Theft - A Tool For Generating Multiple Types Of NTLMv2 Hash Theft Files Ntlm_Theft - A Tool For Generating Multiple Types Of NTLMv2 Hash Theft Files Reviewed by Zion3R on 5:30 PM Rating: 5
FalconEye - Real-time detection software for Windows process injections FalconEye - Real-time detection software for Windows process injections Reviewed by Zion3R on 5:30 PM Rating: 5
PPLdump - Dump The Memory Of A PPL With A Userland Exploit PPLdump - Dump The Memory Of A PPL With A Userland Exploit Reviewed by Zion3R on 5:30 PM Rating: 5