Tony Torres's repositories
browser-scripts
Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair
conti_202202_leak_procedures
This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in the leak and posted on may 10th, 2021 in the channel.
CVE-2020-0796-POC
CVE-2020-0796 Pre-Auth POC
enum4linux-ng
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
evilgophish
evilginx3 + gophish
GadgetToJScript
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
Go-Go-GadgetGospel
Quick Start/Setup of CI/CD for Offensive/Defensive Purposes
GOAD
game of active directory
hackthebox.vim
HackTheBox Vim Colorscheme
kerberoast
Kerberoast attack -pure python-
linux-dotfiles
:file_folder: Dotfiles used on my Unix systems
CobaltStrike
CobaltStrike's source code
LdapRelayScan
Check for LDAP protections regarding the relay of NTLM authentication
LSA-Reaper
Remote command line LSASS extractor
malware-gems
A not so awesome list of malware gems for aspiring malware analysts
PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
PetitPotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
Reverse-Engineering-Tutorial
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
sectools
A Python native library containing lots of useful functions to write efficient scripts to hack stuff.
windapsearch
Python script to enumerate users, groups and computers from a Windows domain through LDAP queries