Choas01 (cutff)

cutff

User data from Github https://github.com/cutff

Company:Localhost

Location:127.0.0.1

GitHub:@cutff

Choas01's repositories

desktop-web-browsers

Almost full list of all desktop web browsers

Stargazers:2Issues:0Issues:0

cve_2024_0044

CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13

Language:PythonStargazers:1Issues:0Issues:0

DojoLoader

Generic PE loader for fast prototyping evasion techniques

Language:CLicense:Apache-2.0Stargazers:1Issues:0Issues:0

gocheck

Because AV evasion should be easy.

Language:GoStargazers:1Issues:0Issues:0

graftcp

A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.

Language:CLicense:GPL-3.0Stargazers:1Issues:0Issues:0

H.I.V.E

H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through the utilization of a single, unified platform.

Language:PythonStargazers:1Issues:0Issues:0
Language:CLicense:GPL-3.0Stargazers:0Issues:0Issues:0

ADSpider

Monitor changes in Active Directory with replication metadata

Language:PowerShellStargazers:0Issues:0Issues:0

android_autorooter

Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely

Language:ShellStargazers:0Issues:0Issues:0

Carseat

Python implementation of GhostPack's Seatbelt situational awareness tool

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

COMThanasia

A set of programs for analyzing common vulnerabilities in COM

Language:C++Stargazers:0Issues:0Issues:0

CVE-2024-22274

CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server

Stargazers:0Issues:0Issues:0

CVE-2024-24401

Auto exploitation tool for CVE-2024-24401.

Language:PythonStargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0

CVE-2024-43044-jenkins

Exploit for the vulnerability CVE-2024-43044 in Jenkins

Language:JavaStargazers:0Issues:0Issues:0

cve-2024-6387-poc

32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc

Language:CStargazers:0Issues:0Issues:0

edr_blocker

Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination IP addresses are parsed based on the server name in TLS Client Hello packet and the provided blocked server name (or blocked string) list in the file.

Language:PythonLicense:BSD-2-ClauseStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

no-defender

A slightly more fun way to disable windows defender. (through the WSC api)

License:GPL-3.0Stargazers:0Issues:0Issues:0

pdfdropper

PDF dropper Red Team Scenairos

Language:PythonStargazers:0Issues:0Issues:0

PPLrevenant

Bypass LSA protection using the BYODLL technique

Language:CStargazers:0Issues:0Issues:0

recaptcha-phish

Phishing with a fake reCAPTCHA

Language:HTMLStargazers:0Issues:0Issues:0

reg_snake

Python tool to interact with WMI StdRegProv

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

RemoteKrbRelay

Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework

Language:C#Stargazers:0Issues:0Issues:0

RWX_MEMEORY_HUNT_AND_INJECTION_DV

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.

Language:C++License:MITStargazers:0Issues:0Issues:0

sccmhound

A BloodHound collector for Microsoft Configuration Manager

Language:C#License:GPL-3.0Stargazers:0Issues:0Issues:0

sleepmask-vs

A simple Sleepmask BOF example

Language:C++License:Apache-2.0Stargazers:0Issues:0Issues:0
Language:C#Stargazers:0Issues:0Issues:0

windows

Windows inside a Docker container.

Language:ShellLicense:MITStargazers:0Issues:0Issues:0