redt1de's starred repositories
thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
lsa-whisperer
Tools for interacting with authentication packages using their individual message protocols
CrimsonEDR
Simulate the behavior of AV/EDR for malware development training.
vulnerable-AD
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
T-Dongle-Ducky
LilyGo T-Dongle-S3 turned into a Rubber Ducky with wifi
maldev-for-dummies
A workshop about Malware Development
LoudSunRun
Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven
Amsi_Bypass_In_2023
Amsi Bypass payload that works on Windwos 11
DllNotificationInjection
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.