Erkut's repositories
UsefulSources
Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes
AmadeyPanel
Amadey malware panel files.
LearningGoJourney
It is a repository where I keep track of this learning process and host the codes I have written.
S-500-G2-Rat-Hvnc-Hidden-Broswers-Hidden-Apps-OperaGX-Rat-Remote-Malware
Clone Profile Hidden Desktop Hidden Browsers Hidden Chrome Hidden Chromodo Hidden SlimJet Hidden Sputnik Hidden Awast Browser Hidden UC Browser Hidden Atom Browser Hidden Opera Neon Hidden Firefox Hidden Edge Hidden Brave Hidden Palemoon Hidden Waterfox Hidden Opera Hidden 360 browser Hidden Comodo Dragon Hidden Internet Explorer Hidden Explorer Hidden Powershell Hidden CMD Hidden Outlook Hidden Thunderbird Hidden Foxmail Hidden Password Recovery HVNC/HVNC browsers HRDP/HRDP browsers/Wallets Reverse Proxy UAC Exploit for Windows 11/10 UAC Exploit for Windows 7 Remote Desktop Remote Cam Remote Microphone Remote Regedit Remote Console Silent Execute File Manager (download,zip,unzip) Disable Windows Defender Execute on connection Tasks Recovery All Chrome based Browsers Recovery for All Firefox based Browsers Recovery & Send Logs To Discord Startup/Schedule task Persistence Miner Watch Dog TaskMgr Dog Spam Tools Hrdp Browers Hrdp Chrome Hrdp Firefox Hrdp Opera Hrdp Brave Hrdp Wallets ArmoryQt Coinomi Atomic Exodus Electrum Jaxx S-500 G2 Builder ! Change Assembly Change Exe Icon Change Exe Name Change Filename File Path Group Clients Mutex Multi Ports Supported Anti Debug System Kill Taskmgr Blue Screen Error Watch Dog Uac Exploit on Execution TaskMgr Dog Export as Shell Code Crypter Merged Run PE Obfuscate
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
CheeseTools
Self-developed tools for Lateral Movement/Code Execution
Cobaltstrike_4.3_Source
Cobaltstrike4.3源码
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
emp3r0r
linux post-exploitation framework made by linux user
evilginx2
Modified evilginx2 that works with Google auth
HSC24RedTeamInfra
Slides and Codes used for the workshop Red Team Infrastructure Automation
HVNC
HVNC Client & Server | Coded in C++ (Fixed Tinynuke)
Khepri
🔥🔥🔥Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
NGLite
A major platform Remote Access Terminal Tool based by Blockchain/P2P.
Penetration-Testing-Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
PowerRemoteDesktop
Remote Desktop entirely coded in PowerShell.
project-based-learning
Curated list of project-based tutorials
rdi-rs
Rusty Reflective DLL Injection - A small reflective loader in Rust 4KB in size
refactoring.nvim
The Refactoring library based off the Refactoring book by Martin Fowler
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
SourcePoint
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
Stealerium
Stealer + Clipper + Keylogger
tun2http
Android VPN interceptor to send HTTP and HTTPS traffic to a proxy