REW-sploit - Emulate And Dissect MSF And *Other* Attacks REW-sploit - Emulate And Dissect MSF And *Other* Attacks Reviewed by Zion3R on 5:30 PM Rating: 5
UnhookMe - An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware UnhookMe - An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware Reviewed by Zion3R on 8:30 AM Rating: 5
Go-Shellcode - A Repository Of Windows Shellcode Runners And Supporting Utilities Go-Shellcode - A Repository Of Windows Shellcode Runners And Supporting Utilities Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
cThreadHijack - Beacon Object File (BOF) For Remote Process Injection Via Thread Hijacking cThreadHijack - Beacon Object File (BOF) For Remote Process Injection Via Thread Hijacking Reviewed by Zion3R on 8:30 AM Rating: 5
Uchihash - A Small Utility To Deal With Malware Embedded Hashes Uchihash - A Small Utility To Deal With Malware Embedded Hashes Reviewed by Zion3R on 5:30 PM Rating: 5
PowerShellArmoury - A PowerShell Armoury For Security Guys And Girls PowerShellArmoury - A PowerShell Armoury For Security Guys And Girls Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Exploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions Exploit_Mitigations - Knowledge Base Of Exploit Mitigations Available Across Numerous Operating Systems, Architectures And Applications And Versions Reviewed by Zion3R on 8:30 AM Rating: 5
Ventoy - A New Bootable USB Solution Ventoy - A New Bootable USB Solution Reviewed by Zion3R on 5:30 PM Rating: 5
Injector - Complete Arsenal Of Memory Injection And Other Techniques For Red-Teaming In Windows Injector - Complete Arsenal Of Memory Injection And Other Techniques For Red-Teaming In Windows Reviewed by Zion3R on 8:30 AM Rating: 5
Whisker - A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute Whisker - A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute Reviewed by Zion3R on 5:30 PM Rating: 5
DcRat - A Simple Remote Tool Written In C# DcRat - A Simple Remote Tool Written In C# Reviewed by Zion3R on 5:30 PM Rating: 5
RemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From User To Domain Admin RemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From User To Domain Admin Reviewed by Zion3R on 5:30 PM Rating: 5
Security Scorecards - Security Health Metrics For Open Source Security Scorecards - Security Health Metrics For Open Source Reviewed by Zion3R on 5:30 PM Rating: 5
WFH - Windows Feature Hunter WFH - Windows Feature Hunter Reviewed by Zion3R on 8:30 AM Rating: 5
FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles FindObjects-BOF - A Cobalt Strike Beacon Object File (BOF) Project Which Uses Direct System Calls To Enumerate Processes For Specific Loaded Modules Or Process Handles Reviewed by Zion3R on 5:30 PM Rating: 5
Backstab - A Tool To Kill Antimalware Protected Processes Backstab - A Tool To Kill Antimalware Protected Processes Reviewed by Zion3R on 8:30 AM Rating: 5
DarkLoadLibrary - LoadLibrary For Offensive Operations DarkLoadLibrary - LoadLibrary For Offensive Operations Reviewed by Zion3R on 5:30 PM Rating: 5
Squalr - Squalr Memory Editor - Game Hacking Tool Written In C# Squalr - Squalr Memory Editor - Game Hacking Tool Written In C# Reviewed by Zion3R on 5:30 PM Rating: 5
RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps RdpCacheStitcher - RdpCacheStitcher Is A Tool That Supports Forensic Analysts In Reconstructing Useful Images Out Of RDP Cache Bitmaps Reviewed by Zion3R on 8:30 AM Rating: 5
NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation NamedPipePTH - Pass The Hash To A Named Pipe For Token Impersonation Reviewed by Zion3R on 5:30 PM Rating: 5