-
TÜV Rheinland i-sec GmbH
- @Kerpanic
Stars
This repo covers some code execution and AV Evasion methods for Macros in Office documents
One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
To fix the Docker and UFW security flaw without disabling iptables
xoreaxeaxeax / movfuscator
Forked from Battelle/movfuscatorThe single instruction C compiler
xoreaxeaxeax / sandsifter
Forked from Battelle/sandsifterThe x86 processor fuzzer
Active Directory ACL exploitation with BloodHound
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
A starttls-capable transparent man-in-the-middle proxy
unofficial windows build of socat http://www.dest-unreach.org/socat/
Template-Driven AV/EDR Evasion Framework
Fast subdomains enumeration tool for penetration testers
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Small and highly portable detection tests based on MITRE's ATT&CK.
The most advanced open-source browser fingerprinting library
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
TheCyberBebop / narly
Forked from d0c-s4vage/narlyAutomatically exported from code.google.com/p/narly
Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification
🤪 A list of funny and tricky JavaScript examples