mynameisjimmy's repositories
Active_Directory_Advanced_Threat_Hunting
This repo is about Active Directory Advanced Threat Hunting
ADCSync
Use ESC1 to perform a makeshift DCSync and dump hashes
AuthLogParser
AuthLogParser is a powerful DFIR tool designed specifically for analyzing Linux authentication logs, commonly known as auth.log
autoNTDS
autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat
Awesome-CloudSec-Labs
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
BounceBack
↕️🤫 Stealth redirector for your red team operation security
CallstackSpoofingPOC
C++ self-Injecting dropper based on various EDR evasion techniques.
DocPlz
Documents Exfiltration project for fun and educational purposes
ghidriff
Python Command-Line Ghidra Binary Diffing Engine
GPOddity
The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).
Hello-Flask
Hello-Flask
Kernel_VADInjector
Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver
LinikatzV2
linikatz is a tool to attack AD on UNIX
lzCloudSecurity
《云安全攻防入门》教材
malware-samples
Malware samples, analysis exercises and other interesting resources.
mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
OffensiveGo
Golang weaponization for red teamers.
PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
PsMapExec
A PowerShell tool that takes strong inspiration from CrackMapExec.
retoolkit
Reverse Engineer's Toolkit
ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
sshscript
System Automation in Python
system-design-101
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
UAC-Bypass-FUD
The UAC Bypass program is designed to run files with elevated privileges on Windows without requesting user permission or displaying the UAC screen. It provides a way to bypass User Account Control (UAC) restrictions for specific tasks.