hyabcd's repositories
ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
Awesome-POC
一个各类漏洞POC知识库
conti-leaks-englished
Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.
CrackMapExec
A swiss army knife for pentesting networks
ctftool
Interactive CTF Exploration Tool
CVE-2018-20250
exp for https://research.checkpoint.com/extracting-code-execution-from-winrar
CVE-2018-8420
It's not real CVE-2018-8420,just execute the script in <ms:script> tag
CVE-2018-8581
CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2019-0604
CVE-2019-0604
CVE-2019-0708
Scanner PoC for CVE-2019-0708 RDP RCE vuln
CVE-2019-0709
dump
CVE-2019-11708
Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
cve-2019-1458_POC
POC for cve-2019-1458
CVE-2019-5786
FileReader Exploit
CVE-2020-0796-PoC
PoC for triggering buffer overflow via CVE-2020-0796
CVE-2023-34039
CVE-2023-34039
deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
EVTX-ATTACK-SAMPLES
Windows Events Samples
Gepetto
IDA plugin which queries OpenAI's ChatGPT to explain decompiled functions
iMonitorSDK
系统监控开发套件(sysmon、procmon、edr、终端安全、主机安全、零信任、上网行为管理、沙箱)
injection
Windows process injection methods
Mhyprot2DrvControl
A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.
PoCs
Proof-of-concept code for various bugs
rtfraptor
Extract OLEv1 objects from RTF files by instrumenting Word
seeyonOA_POC
致远OA漏洞验证
UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
Windows-RCE-exploits
The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samples are uploaded for education purposes for red and blue teams.