ahaslett's repositories
Adv360-Pro-ZMK
Production repository for the all-new Advantage360 Professional using ZMK engine
Microsoft-Extractor-Suite
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
jsoncrack.com
đź”® Seamlessly visualize your JSON data instantly into graphs; paste, import or fetch!
log4shell-rex
PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs
msynth
Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions
ProxyShell
ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)
HellsGatePPID
Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process
axiom
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
ShadowSteal
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Detection-Ideas-Rules
Detection Ideas & Rules repository.
injection
Windows process injection methods
attack_data
A Repository of curated datasets from various attacks
PowerShell-Scripts
Random PowerShell scripts worth sharing
evtx-hunter
evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
ThreatHunting
Tools for hunting for threats.
CVE-2021-1675-LPE
Local Privilege Escalation Edition for CVE-2021-1675
notes
Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.
peda
PEDA - Python Exploit Development Assistance for GDB
regexShortcuts
Misc Commands I've found helpful.
awesome_windows_logical_bugs
collect for learning cases
DynamicKernelShellcode
An example of how x64 kernel shellcode can dynamically find and use APIs