v4nyl's repositories
Advanced-SQL-Injection-Cheatsheet
A cheat sheet that contains advanced queries for SQL Injection of all types.
AlanFramework
A C2 post-exploitation framework
BARK
BloodHound Attack Research Kit
BOF-patchit
An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are available.
BugBountyScanner
A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
cs-token-vault
In-memory token vault BOF for Cobalt Strike
DeathSleep
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
defcon_27_windbg_workshop
DEFCON 27 workshop - Modern Debugging with WinDbg Preview
eagle-rs
Rusty Rootkit: Windows Kernel Driver in Rust for Red Teamers
EDD
Enumerate Domain Data
Ekko
Sleep Obfuscation
evilgophish
evilginx2 + gophish
GwisinMsi
PoC MSI payload based on ASEC/AhnLab's blog post
INTRACTABLEGIRAFFE
A Proof of Concept Rootkit Demonstrating Keylogging and Virtual File System (VFS) Capabilities
iscsicpl_bypassUAC
UAC bypass for x64 Windows 7 - 11
Kernel-Cactus
It's pointy and it hurts!
NiCOFF
COFF and BOF Loader written in Nim
PackMyPayload
A PoC that packages payloads into output containersb to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
PassTheCert
Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel
PersistAssist
Fully modular persistence framework
PINKPANTHER
Windows x64 handcrafted token stealing kernel-mode shellcode
powerview.py
PowerView alternative
Proxy_Egress_Persistence
A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies
PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
SCMKit
Source Code Management Attack Toolkit
stratus-red-team
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.