Nighthawk's repositories
UAC-Exploit
UAC bypass for confirmation bypass in win 10/11
LNKExploit
A simple project to show how to create .lnk files using c#
9h4wk.github.io
My Infosec Blog
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
africaHackonAndroidMalware
For educational and Testing Purposes
awesome-android-security
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
awesome-osint
:scream: A curated list of amazingly awesome OSINT
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
chisel
A fast TCP/UDP tunnel over HTTP
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
hackonProject
hackonProject
HackTheBox-CTF-Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty.
hci.io
hci
JayLogger
Simple Keylogger which saves keylogs in logs.txt in the Documents folder
keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
match-replace-burp
Useful Match and Replace BurpSuite Rules
pdfs-security
My collection of Security Books
Penetration_Testing_POC
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
RedTeam-OffensiveSecurity
Tools & Interesting Things for RedTeam Ops
RsaCtfTool
RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data
sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Shellcode-Downloader-CreateThread-Execution
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.