Leah Schmidt's repositories
FCL
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
digispark-usbkey-board
Digispark attiny85 USB key "rubber ducky" clone.
dll_to_exe
Converts a DLL into EXE
koadic
Koadic C3 COM Command & Control - JScript RAT
Cheatsheet-God
Penetration Testing / OSCP Biggest Reference Bank
edm
Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2
BrokenType
TrueType and OpenType font fuzzing toolset
pentest_compilation
Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios
conformer
Password Guessing for different Web Portals
Detours
Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
machine_learning_security
Source code about machine learning and security.
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, alowing to bypass 2-factor authentication.
byob
BYOB (Build Your Own Botnet)
Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
telegram-export
Export Telegram chat data and history
Windows-RCE-exploits
The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samples are uploaded for education purposes for red and blue teams.
GyoiThon
GyoiThon is a growing penetration test tool using Machine Learning.
Amber
Reflective PE packer.
Invoke-PSImage
Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
Leak-NTLM-hash-via-HTML
List of HTML tags for leaking NTLM-hashes
dns2proxy
Offensive DNS server
subTee-gits-backups
subTee gists code backups
Social-Engineering-Payloads
Collection of social engineering payloads
DropboxC2C
DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
dnlib-Metamorphic-code-exemple
Using dnlib to make Metmorphic code in C# in less than 100 lines
TinyNuke
zeus-style banking trojan
atom-bombing
Brand New Code Injection for Windows