Kathan Patel's starred repositories
freegpt-webui
GPT 3.5/4 with a Chat Web UI. No API key required.
exploitation-course
Offensive Software Exploitation Course
BlackLotus
BlackLotus UEFI Windows Bootkit
AppleJuice
Apple BLE proximity pairing message spoofing
DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
xurlfind3r
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
PenetrationTesting_Notes-
My Notes about Penetration Testing
autobloody
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
NTDLLReflection
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
CRTP-Notes
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
RecycledInjector
Native Syscalls Shellcode Injector
D1rkInject
Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
combine_harvester
Rust in-memory dumper
ModuleShifting
Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctypes
xsubfind3r
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
HtmlSmuggling
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaScript features to hide malicious payloads and evade security detections. The HTML smuggling method is highly evasive. It could bypass standard perimeter security controls like web proxies and email gateways, which only check for suspicious attachments like EXE, DLL, ZIP, RAR, DOCX or PDF
SIEM-Cheat-Sheet
SIEM Cheat Sheet
VT-stealer
VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server
injection-for-dummies
A collection of PoCs for different injection techniques on Windows!
PowerJoker
PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
pdf-smuggler
Create PDFs with HTML smuggling attachments that save on opening the document.
Windows-Event-Logs-With-Event-IDs
A running list of Windows sources and the related event ids.