ztko's repositories
Scada-LTS-Docker-for-ARM-devices
Scada-LTS Docker for ARM Devices
ADCollector
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
armory
The Official Sliver Armory
caldera
Automated Adversary Emulation Platform
community-threats
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
CVE-2021-1366
Cisco AnyConnect Posture (HostScan) Local Privilege Escalation: CVE-2021-1366
Docker-C3
Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container
Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
impacket_static_binaries
Standalone binaries for Linux/Windows of Impacket's examples
InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
kali-docker
This Kali Linux Docker container offers a full desktop experience by using the tightvncserver to provide a VNC connection to the container and novnc for simple VNC access with your browser.
KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
NET-Obfuscate
Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
osed-scripts
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
PowerShx
Run Powershell without software restrictions.
PowerShxDll
Run Powershell without software restrictions.
RAIDS
The source code of road context-aware IDS for autonomous cars
Rubeus
Trying to tame the three-headed dog.
secfeed
Security feed, done in the stupid simple way
SharpLateral
Lateral Movement
Stracciatella
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
win-x86-shellcoder
A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory