empyrials's repositories
ollama-swarm
Educational framework exploring ergonomic, lightweight multi-agent orchestration. Modified to use local Ollama endpoint
Deep-Live-Cam
real time face swap and one-click video deepfake with only a single image
GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
edl
Inofficial Qualcomm Firehose / Sahara / Streaming / Diag Tools :)
blue-merle
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
AWSome-Pentesting
My cheatsheet notes to pentest AWS infrastructure
hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
CrackMapExec
A swiss army knife for pentesting networks
msdt-follina
Codebase to generate an msdt-follina payload
follina.py
POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes
SOCKS5-Proxy-Handler
Modern C++ SOCKS5 Client Handler
CLRvoyance
Managed assembly shellcode generation
solarflare
SolarWinds Orion Account Audit / Password Dumping Utility
OffensiveCSharp
Collection of Offensive C# Tooling
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
Invoke-CommandAs
Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
SharpRDP
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
Win10-Initial-Setup-Script
PowerShell script for automation of routine tasks done after fresh installations of Windows 10 / Server 2016 / Server 2019
VSCELicense
PowerShell module to get and set Visual Studio Community Edition license expiration date in the registry
ProcessReimaging
Process reimaging proof of concept code
eavesarp
Analyze ARP requests to identify hosts that are communicating with one another.
Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
octoprint-usb-autoconnect
udev hook to reconnect the serial connection of your 3D printer in OctoPrint
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.