ahaslett's repositories
log4shell-rex
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
Adv360-Pro-ZMK
Production repository for the all-new Advantage360 Professional using ZMK engine
attack_data
A Repository of curated datasets from various attacks
awesome_windows_logical_bugs
collect for learning cases
axiom
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
CVE-2021-1675-LPE
Local Privilege Escalation Edition for CVE-2021-1675
Detection-Ideas-Rules
Detection Ideas & Rules repository.
DynamicKernelShellcode
An example of how x64 kernel shellcode can dynamically find and use APIs
evtx-hunter
evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
HellsGatePPID
Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process
injection
Windows process injection methods
jsoncrack.com
đź”® Seamlessly visualize your JSON data instantly into graphs; paste, import or fetch!
Microsoft-Extractor-Suite
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
msynth
Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions
notes
Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
peda
PEDA - Python Exploit Development Assistance for GDB
PowerShell-Scripts
Random PowerShell scripts worth sharing
ProxyShell
ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)
regexShortcuts
Misc Commands I've found helpful.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
ShadowSteal
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
ThreatHunting
Tools for hunting for threats.