pwntheworld's repositories
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome-flipperzero
🐬 A collection of awesome resources for the Flipper Zero device.
black-hat-rust
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
demiguise
HTA encryption tool for RedTeams
Dragnmove
Infect Shared Files In Memory for Lateral Movement
ExecRemoteAssembly
Execute Remote Assembly with args passing and with AMSI and ETW patching
FilelessRemotePE
Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique
GOAD
game of active directory
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
HOLLOW
EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode
Hunt-Sleeping-Beacons
Aims to identify sleeping beacons
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
maldev-for-dummies
A workshop about Malware Development
nanodump
The swiss army knife of LSASS dumping
nanorobeus
COFF file (BOF) for managing Kerberos tickets.
ObfLoader
MAC, IPv4, UUID shellcode Loaders and Obfuscators to obfuscate the shellcode and using some native API to converts it to it binary format and loads it.
OffensiveRust
Rust Weaponization for Red Team Engagements.
PPLdump
Dump the memory of a PPL with a userland exploit
Publications
A list of published research documents
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
steg86
Hiding messages in x86 programs using semantic duals
TartarusGate
TartarusGate, Bypassing EDRs
Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
WADComs.github.io
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.