Paul Werther's repositories
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Disable-Windows-Defender-
Disable Windows Defender (+ UAC Bypass, + Upgrade to SYSTEM)
evil-winrm
The ultimate WinRM shell for hacking/pentesting
redteam-research
Collection of PoC and offensive techniques used by the BlackArrow Red Team
rogue-jndi
A malicious LDAP server for JNDI injection attacks
api-documentation
The documentation for the Gophish API
avo
Build Ruby on Rails apps 10x faster
avodocs
Documentation website for Avo
blackarch
An ArchLinux based distribution for penetration testers and security researchers.
cve-2020-0688
cve-2020-0688
CVE-2021-1675
Impacket implementation of CVE-2021-1675
DonPAPI
Dumping DPAPI credz remotely
ExecuteAssembly
Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash).
mycloud-restsdk-recovery-script
A script to recover files from MyCloud REST SDK Folder Structure
nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
processwire
ProcessWire 3.x is a friendly and powerful open source CMS with a strong API.
psudohash
Generates millions of keyword-based password mutations in seconds.
RustRedOps
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language. (In Construction)
Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Sherlock
powershell -c "$a=New-Object Net.WebClient;iex $a.DownloadString('https://raw.githubusercontent.com/rasta-mouse/Sherlock/master/Sherlock.ps1');Find-AllVulns"
wazuh-ruleset
Wazuh - Ruleset