- China
- @m0nkeyt3ch
Lists (10)
Sort Name ascending (A-Z)
Stars
Pure Malware Development Resource Collections
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certain signatures and it will still work.
LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission.
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
Search for potential frontable domains
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
Collection of malware source code for a variety of platforms in an array of different programming languages.
CyberSecurityUP / RustRedOps
Forked from joaoviictorti/RustRedOps🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
MinIO is a high-performance, S3 compatible object store, open sourced under GNU AGPLv3 license.
Panduan singkat untuk memulai belajar reverse engineering terutama software reversing atau reverse code engineering.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Hunt for security weaknesses in Kubernetes clusters
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀
TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...
Reports from various areas of information security
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
a signal handler race condition in OpenSSH's server (sshd)