A's repositories

abuseACL

A python script to automatically list vulnerable Windows ACEs/ACLs.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0
Language:C#License:GPL-3.0Stargazers:0Issues:0Issues:0

aws_url_signer

POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

D1rkInject

Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state

Language:C++License:MITStargazers:0Issues:0Issues:0

dtlspipe

Generic DTLS wrapper for UDP sessions

Language:GoLicense:MITStargazers:0Issues:0Issues:0

Invoke-SMBRemoting

Interactive Shell and Command Execution over Named-Pipes (SMB)

Language:PowerShellStargazers:0Issues:0Issues:0

NET-MalwareCryptor

OpenSource malware packer

Language:Visual Basic .NETLicense:MITStargazers:0Issues:0Issues:0

Reaper

「💀」Proof of concept on BYOVD attack

Language:C++License:GPL-3.0Stargazers:0Issues:0Issues:0

SharpBlackout

Terminate AV/EDR leveraging BYOVD attack

Language:C#Stargazers:0Issues:0Issues:0

SQLi

It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programmed by the TYG team.

Language:PythonStargazers:0Issues:0Issues:0

Subdominator

Your One-Stop Solution for Subdomain Enumeration

Stargazers:0Issues:0Issues:0

swarm

Formerly known as axiom, swarm is the next generation of distributed cloud scanning and attack surface monitoring.

Stargazers:0Issues:0Issues:0