beyond-order's repositories
Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
awesome-reversing
A curated list of awesome reversing resources
Creds
Some usefull Scripts and Executables for Pentest & Forensics
Cyber-Bookmarks
A list of bookmarks I have used since I started my journey in cyber security
exeJoinerX
🧿Join your two exe files
LeetCode-Questions-CompanyWise
Contains Company Wise Questions sorted based on Frequency and all time
ligolo
Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
link
link is a command and control framework written in rust
LOL-Bin
LOL's collections
malware-gems
A not so awesome list of malware gems for aspiring malware analysts
mona
Corelan Repository for mona.py
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
OllyDbg-Archive
All the latest releases and files for OllyDbg...
paper_collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
PELoader
PE loader with various shellcode injection techniques
powershell-reverse-http
:innocent: A Powershell exploit service that opens a reverse http connection via meterpreter
PR0CESS
some gadgets about windows process and ready to use :)
pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
ransomware
Seeing how easy it is to create ransomware.
RemotePotato0
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
RottenPotatoNG
New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.
ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
Shellcode-Downloader-CreateThread-Execution
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
TCP_Flooding_IP_SPoofing
SYN attack with IP spoofing from random IP source address and IP source port
theHarvester
E-mails, subdomains and names Harvester - OSINT
UACME
Defeating Windows User Account Control