scanf's starred repositories
SharpWxDump
微信客户端取证,可获取用户个人信息(昵称/账号/手机/邮箱/数据库密钥(用来解密聊天记录));支持获取多用户信息,不定期更新新版本偏移,目前支持所有新版本、正式版本
EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Chaos-Rootkit
Now You See Me, Now You Don't
GoFileBinder
golang免杀捆绑器
azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
microwaveo
将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密
CVE-2022-40684
A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
CVE-2022-39952
POC for CVE-2022-39952
CallstackSpoofingPOC
C++ self-Injecting dropper based on various EDR evasion techniques.
ActiveMqRCE
用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入
CVE-2021-21974
POC for CVE-2021-21974 VMWare ESXi RCE Exploit
driver_callback_bypass_1909
研究和移除各种内核回调,在anti anti cheat的路上越走越远
CVE-2023-27532
Exploit for CVE-2023-27532 against Veeam Backup & Replication
PTH_Exchange
If you only have hash, you can still operate exchange
ExchangePE
Asset scanning by dictionary stitching Domain to identify Exchange Servers versions
Chrome-V8-RCE-CVE-2021-38003
CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224
NativePayload_ASM3
NativePayload_ASM/AsynASM , Injecting Meterpreter Payload bytes into local Process via Delegation Technique [Technique D] + in-memory with delay Changing RWX to X [Bypassing AVs]