A's repositories
abuseACL
A python script to automatically list vulnerable Windows ACEs/ACLs.
aws_url_signer
POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF
D1rkInject
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
dtlspipe
Generic DTLS wrapper for UDP sessions
Invoke-SMBRemoting
Interactive Shell and Command Execution over Named-Pipes (SMB)
NET-MalwareCryptor
OpenSource malware packer
Reaper
「💀」Proof of concept on BYOVD attack
SharpBlackout
Terminate AV/EDR leveraging BYOVD attack
SQLi
It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programmed by the TYG team.
Subdominator
Your One-Stop Solution for Subdomain Enumeration
swarm
Formerly known as axiom, swarm is the next generation of distributed cloud scanning and attack surface monitoring.