Gabriel Compan's repositories
stager.dll
Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/
Invoke-Recon
"Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' lab from pentesteracademy.
wptsextensions.dll
WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.
phackt.github.io
https://phackt.com
killswitch
VPN Killswitch
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
CORScanner
Fast CORS misconfiguration vulnerabilities scanner🍻
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
Crypto-Honeypot-Detector
The project aims to identify crypto honeypots in many chains.
Drupalgeddon2
Exploit for Drupalgeddon 2 - CVE-2018-7600
gateio-crypto-trading-bot-binance-announcements-new-coins
This is a crypto trading bot that scans the Binance Annoucements page for new coins, and places trades on Gateio
p5-ssl-tools
various standalone perl scripts
PowerUpSQL
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
puppeteer-examples
Puppeteer example scripts for running Headless Chrome from Node. Run them at https://puppeteersandbox.com
truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
windapsearch
Python script to enumerate users, groups and computers from a Windows domain through LDAP queries
zimbra_poc
Zimbra XXE+SSRF+UPLOAD Poc