H4xl0r's repositories
acheron
indirect syscalls for AV/EDR evasion in Go assembly
AtomLdr
A DLL loader with advanced evasive features
BackupOperatorToolkit
The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin
burp-dom-scanner
Burp Suite's extension to scan and crawl Single Page Applications
chromecookiestealer
Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.
CVE-2023-21608
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
EntropyReducer
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
Fiber
Using fibers to run in-memory code in a different and stealthy way.
Forensia
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
GlllPowerloader
绕过AV/EDR的代码例子(Code example to bypass AV/EDR)
hades
Go shellcode loader that combines multiple evasion techniques
Handle-Ripper
Windows handle hijacker
ipa-medit
Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
jetstrap
A Laravel 8 package to easily switch TailwindCSS resources generated by Laravel Jetstream and Breeze to Bootstrap 4.
LinkedInDumper
Python 3 script to dump company employees from LinkedIn API
Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
Nidhogg
Nidhogg is an all-in-one simple to use rootkit for red teams.
PythonMemoryModule
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
RedditC2
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
shodan
Shodan Dorks
sshd_backdoor
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
TLDHunt
Domain Availability Checker
Tor
Let’s do some bullshit with the Tor network. I hope you’re ready to do some config without any valid reason and no real purpose🧃
Trawler
PowerShell script to help Incident Responders discover adversary persistence mechanisms.
urh
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
VX-API
Collection of various malicious functionality to aid in malware development
XSS-Exploitation-Tool
An XSS Exploitation Tool