Sebastian Roox's repositories
assorted
Assorted documentation, scripts and tools
atom-bombing
Brand New Code Injection for Windows
Blackbone
Windows memory hacking library
CVE-2016-3714
ImaegMagick Code Execution (CVE-2016-3714)
duktape
Duktape - embeddable Javascript engine with a focus on portability and compact footprint
duktape-misc
Miscellaneous Duktape libraries and utilities
HyperBone
Minimalistic VT-x hypervisor with hooks
java_deserialization_exploits
A collection of Java Deserialization Exploits
libevtx
Library and tools to access the Windows XML Event Log (EVTX) format
libexe
Library and tools to access the executable (EXE) format
libfguid
Library for GUID/UUID data types
libfusn
Library for Update Sequence Number (USN) Journal data types
libfvde
Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes
libfwnt
Library for Windows NT data types
liblnk
Library and tools to access the Windows Shortcut File (LNK) format
mimikatz
A little tool to play with Windows security
Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
nexe
🎉 create a single executable out of your node.js apps
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PowerLoaderEx
PowerLoaderEx - Advanced Code Injection Technique for x32 / x64
ps1-toolkit
Obfuscated Penetration Testing PowerShell scripts
pupy
Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in python. It features a all-in-memory execution guideline and leaves very low footprint. Pupy can communicate using various transports, migrate into processes (reflective injection), load remote python code, python packages and python C-extensions from memory.
rewolf-msi-exploit
MSI NTIOLib/WinIO Local Privilege Escalation exploit
theZoo
A repository of LIVE malwares for your own joy and pleasure