R0ckNRolla's repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
badusb_botnet
:busts_in_silhouette::smiling_imp: Infect a pc with badusb and establish a connection through telegram.
BlueKeep
Proof of concept for CVE-2019-0708
CarbonCopy
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
cobaltstrike3.13
cracked
CVE-2019-0708
dump
de4dot
.NET deobfuscator and unpacker.
Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
Get-NetNTLM
Powershell module to get the NetNTLMv2 hash of the current user
hackingLibrary
APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade anti-virus detection, Rookit CYPTER, Antiviruses Bypassing-av, social engineering,WORMS,Sandbox-Escape, Memory-injection, Ethical,Gray,White,RedTeam,Bugbounty,bug hunter,Cheat Sheet...
ImpersonateSystem
Impersonate Windows built-in SYSTEM account
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/Exploit/APT/0day/Shellcode/Payload/priviledge/OverFlow/WebShell/PenTest)
Malleable-C2-Randomizer
A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
NTLMX
Post-exploitation NTLM password hash extractor
oscp_prep
oscp notes for sept '19 test
Pika-SignTool
Pika-SignTool
PyRai
MIRAI botnet in python3
qubes-vpn
Basic VPN setup for Qubes OS as well as some related tooling.
Quickrundown
Smart overlay for Cobalt Strike PS function
smbdoor
Windows kernel backdoor via registering a malicious SMB handler
SVScanner
SVScanner - Scanner Vulnerability And MaSsive Exploit.
Terminal
The new Windows Terminal, and the original Windows console host -- all in the same place!
Terminals
Terminals is a secure, multi tab terminal services/remote desktop client. It uses Terminal Services ActiveX Client (mstscax.dll). The project started from the need of controlling multiple connections simultaneously. It is a complete replacement for the mstsc.exe (Terminal Services) client. This is official source moved from Codeplex.
windows_pentest_tools
My pentest tools used two years ago. Part1
zerokit
Zerokit/GAPZ rootkit (non buildable and only for researching)