Wicus Ross's repositories
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
android_triage
Bash script to extract data from an Android device
AzureAD-incident-response
Notes on responding to security breaches relating to Azure AD
Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
CBL-Mariner
Linux OS for Azure 1P services and edge appliances
CrossC2
generate CobaltStrike's cross-platform payload
cti-python-stix2
OASIS TC Open Repository: Python APIs for STIX 2
CVE-2021-44228-Apache-Log4j-Rce
Apache Log4j 远程代码执行
diva-android
DIVA Android - Damn Insecure and vulnerable App for Android
epss_evaluations
A simple tool to evaluate CVE data sets in terms of EPSS
FastChat
The release repo for "Vicuna: An Open Chatbot Impressing GPT-4"
JNDI-Injection-Exploit
JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)
llama.cpp
Port of Facebook's LLaMA model in C/C++
MicrosoftWontFixList
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
minecraft-log4j-honeypot
Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam
Office-365-Extractor
The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)
openedr
Open EDR public repository
PCS7-Hardening-Tool
PowerShell script for hardening Siemens Simatic PCS 7 servers
phoca
Tool to analyze and detect MITM phishing toolkits on the web.
pwncat
Fancy reverse and bind shell handler
RemotePotato0
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
saml-raider
SAML2 Burp Extension
SignedUEFIShell
Information about a signed UEFI Shell that can be used when Secure Boot is enabled.
slipstream
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website
WinboxPoC
Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)