v4nyl's repositories
awesome-industrial-protocols
Security-oriented list of resources about industrial network protocols.
bloodyAD
BloodyAD is an Active Directory Privilege Escalation Framework
DLHell
Local & remote Windows DLL Proxying
entraspray
Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)
git-rotate
Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking
GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
GraphStrike
Cobalt Strike HTTPS beaconing over Microsoft Graph API
grimreaper
A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls
Kdrill
Python tool to check rootkits in Windows kernel
KExecDD
Admin to Kernel code execution using the KSecDD driver
lolcerts
A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors
Marble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
NativeDump
Dump lsass using only Native APIs by hand-crafting Minidump files (without MinidumpWriteDump!)
Neo-reGeorg
Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
Nidhogg
Nidhogg is an all-in-one simple to use rootkit for red teams.
NidhoggCSharpApi
C# API for Nidhogg rootkit
No-Consolation
A BOF that runs unmanaged PEs inline
pendulum
Linux Sleep Obfuscation
proxybroker2
The New (auto rotate) Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS :performing_arts:
RedTeamCCode
Red Team C code repo
ShellcodeTemplate
An easily modifiable shellcode template for Windows x64/x86
Shhhloader
Syscall Shellcode Loader (Work in Progress)
Shoggoth
Shoggoth: Asmjit Based Polymorphic Encryptor
Stowaway
đź‘»Stowaway -- Multi-hop Proxy Tool for pentesters
thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
UAC-BOF-Bonanza
Collection of UAC Bypass Techniques Weaponized as BOFs
unKover
PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory.