juan157's repositories
NTLMRawUnHide
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl
Pentesting
Tricks for penetration testing
cs-rdll-ipc-example
Example code for using named pipe output with beacon ReflectiveDLLs
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Face-Depixelizer
Face Depixelizer based on "PULSE: Self-Supervised Photo Upsampling via Latent Space Exploration of Generative Models" repository.
ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
exploits-2
Some of my public exploits
spoolsystem
Print Spooler Named Pipe Impersonation for Cobalt Strike
PoC-in-GitHub
📡PoC auto collect from GitHub.
Minimalistic-offensive-security-tools
A repository of tools for pentesting of restricted and isolated environments.
stegcloak
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
patch-checker
Web-based check for Windows privesc vulnerabilities
BlackNET
Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.
pathbrute
Pathbrute
top10webseclist
Top Ten Web Hacking Techniques List
backdoorfactory
A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
DotNetDeserializationScanner
Scans for .NET Deserialization Bugs in .NET Assemblies
pivotnacci
A tool to make socks connections through HTTP agents
recon-pipeline
An automated target reconnaissance pipeline.
InveighZero
Windows C# LLMNR/mDNS/NBNS/DNS/DHCPv6 spoofer/man-in-the-middle tool
SharpWMI
SharpWMI is a C# implementation of various WMI functionality.
FALCONSTRIKE
A stealthy, targeted Windows Loader for delivering second-stage payloads(shellcode) from Github to the host machine undetected
Red-Team
Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation
SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
LFI-Payload-List
LFI Payloads List coolected from github repos