0xToast's repositories
Cplusplus
This repo contains C++ code used to study the language
awesome-malware-development
Organized list of my malware development resources
Penetration-Testing-Tools
A collection of more than 160+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
LinkedInt
LinkedIn Recon Tool
Spray365
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
OffensiveVBA
This repo covers some code execution and AV Evasion methods for Macros in Office documents
Go365
An Office365 User Attack Tool
evil-winrm
The ultimate WinRM shell for hacking/pentesting
windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
eBook-BypassingAVsByCSharp
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
Videos-BypassingAVsByCSharp
Video files for eBook: "Bypassing AVs by C#.NET Programming"
Octopus
Open source pre-operation C2 server based on python and powershell
smuggler
Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3
SigThief
Stealing Signatures and Making One Invalid Signature at a Time
S3Scanner
Scan for open AWS S3 buckets and dump the contents
airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
pe_to_shellcode
Converts PE into a shellcode
nmapAutomator
A script that you can run in the background!
oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
Veil
Veil 3.1.X (Check version info in Veil at runtime)
exploitation-course
Offensive Software Exploitation Course
SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
ffuf
Fast web fuzzer written in Go
GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
venom
venom - shellcode generator/compiler/handler (metasploit)