aarandomhacker's repositories
Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
AmsiBypass-OpenSession
This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file
AmsiBypassHookManagedAPI
A new AMSI Bypass technique using .NET ALI Call Hooking.
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
BOFs
Collection of Beacon Object Files
byob
An open-source post-exploitation framework for students, researchers and developers.
C2concealer
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
Cybersecurity-Resources
A Library of various cybersecurity resources
ferret
Declarative web scraping
GitGot
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
GOAD
game of active directory
iam-vulnerable
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.
Ivy
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
lyncsmash
locate and attack Lync/Skype for Business
merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
MFASweep
A tool for checking if MFA is enabled on multiple Microsoft Services
NtHiM
Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!
PassTheCert
Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel
PELoader
PE loader with various shellcode injection techniques
PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
SOAPHound
SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.
subjack
Subdomain Takeover tool written in Go
SysWhispers
AV/EDR evasion via direct system calls.
UltimateWDACBypassList
A centralized resource for previously documented WDAC bypass techniques
velociraptor
Digging Deeper....