whydee86's repositories

SnD_AMSI

Start new PowerShell without etw and amsi in pure nim

PlayWithDefender

An easy tool to disable and enable windows defender protections

FUD-ShellCode-UUID

Making Shellcode fully undetectable using uuid

Language:ShellStargazers:23Issues:1Issues:0

ComPP

Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.

Language:PythonLicense:MITStargazers:2Issues:0Issues:0

Invoke-Nanodump

HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection

Language:PowerShellStargazers:1Issues:0Issues:0

NimHollow

Nim implementation of Process Hollowing using syscalls (PoC)

Language:NimStargazers:1Issues:0Issues:0

unDefender

Killing your preferred antimalware by abusing native symbolic links and NT paths.

Language:C++Stargazers:1Issues:0Issues:0

API-dnsdumpster.com

(Unofficial) Python API for https://dnsdumpster.com/

Language:PythonStargazers:0Issues:0Issues:0

CallbackHell

PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)

Language:C++License:MITStargazers:0Issues:0Issues:0

dnsx

dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.

Language:GoLicense:MITStargazers:0Issues:0Issues:0

LocateMe

Get Your Victim's Location, Organization, Co-ordinates and much more...

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

malice

VirusTotal Wanna Be - Now with 100% more Hipster

Language:GoLicense:Apache-2.0Stargazers:0Issues:0Issues:0

myNimExamples

my mim examples.

Stargazers:0Issues:0Issues:0

NimExamples

A collection of offensive Nim example code

Language:NimStargazers:0Issues:0Issues:0

NimJection

Nim Shellcode Injector

Language:NimLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

nmap

Nmap - the Network Mapper. Github mirror of official SVN repository.

Language:CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

OffensiveNim

My experiments in weaponizing Nim (https://nim-lang.org/)

Language:NimLicense:BSD-2-ClauseStargazers:0Issues:0Issues:0

Perfusion

Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)

Language:C++Stargazers:0Issues:0Issues:0

PEx64-Injector

Inject your x64 bit executable to any process, masking it as a legitimate process for Anti-Virus evasion.

Language:C#Stargazers:0Issues:0Issues:0

PickleC2

PickleC2 is a post-exploitation and lateral movements framework

Language:PowerShellStargazers:0Issues:0Issues:0

SecretFinder

SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

tld-list

List of all top-level domains in all data formats.

Language:HTMLLicense:MITStargazers:0Issues:0Issues:0

VECTR

VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios

Stargazers:0Issues:0Issues:0