Aahron Chetrit's starred repositories
Guard-Bypass-Toolkit-LSASS-Dumper-and-Mimikatz-Runner
This project demonstrates a method to bypass Windows Defender while executing certain operations such as dumping LSASS and executing Mimikatz in-memory. The tactics involved include manual PE (Portable Executable) loading, EAT (Export Address Table) hooking, and memory manipulation.
EAT-Functions-Hooking
This project focuses on manipulating the Export Address Table (EAT) to achieve function hooking in Windows binaries.
test_eat_hook
A sample of EAT hook
Privilege-escaletion-using-vulnerability-on-Microsoft-teams-Reverse-shell-Password-stealer
Privilege escalation using vulnerability on Microsoft teams by doing process injection and dll proxing Reverse shell, Password stealer, jupyter notebook, token sniffer, ransomware based on my encryption algorithm
ahron-chet
Config files for my GitHub profile.
Advanced-spyware-managed-through-ngrok-any-file-sharing-server
Advanced spyware and revers shell managed through ngrok
Virus-scanner
Virus scanner with real time protection, and massive scanning feature, using virus total api
Reverse-Shell-in-5-different-language
reverse shell in 5 different language managing through telegram bot
My-encryption-Algorithm-in-powershell
My symmetric encryption algorithm implemented in pure powershell
Advaced-keylogger-reverse-shell-ransomware.-spyware-passwords-stealer
this program is managed through telegram. send data, exicute commands, collect data, encrypt data, collect password and sends all the information to your telegram accaunt.
Reverse-Shell-managed-through-virustotal-api
Reverse Shell managed through virustotal api, to start the shell upload random file to virus total website copy the file hash into the "hashSource" variable on the top of the code, also copy your virus total api to "ApiVt" variable, do the same on both client and server.
Siemplify-connector-and-integration-to-custom-logs-collector
Siemplify-connector and integration to custom logs collector using socket and logstash.
privilege-escalation-password-stealer-jupyter-notebook-token-stealer
privilege escalation, password stealer , jupyter notebook token stealer and lssass & sam dumper, the program will not be blocked or detected by any antivirus & edr
Efficient-Vulnerability-Scanning-and-Payload-Generation
A tool that automates vulnerability scanning and payload generation using Procmon and advanced techniques. It generates reports and payloads in C++ and can be run with options to customize the scan duration, apply filters, and specify the output path. It requires a GCC compiler to run in addition to Procmon.
Local-Windows-Privilege-escalation
Demonstrating privilege escalation in Windows, enabling a normal user to gain SYSTEM NT AUTHORITY privileges through a combination of techniques.