- United States
Stars
This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of almost any SYSTEM process.
AI powered system that classifies threat alerts into their various Mitre tactics and techniques
Source for tasks I have used with Covenant
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of security analyzers tools tools
OriginTrail Decentralized Knowledge Graph network node
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A toolbox for extracting RSA private keys from public keys.
A python script for testing Aws Cognito IdentityPoolId
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.
Clone of Whatsapp Web's current UI.
A .NET tool for exporting and importing certificates without touching disk.
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
ScareCrow - Payload creation framework designed around EDR bypass.
Hardened Proof of Concept of D/Invoke Process Injection malware
Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.
A simple python script for doing brute-force attack using selenium.
Tool for catching and logging different types of requests.
Adversary Tactics - PowerShell Training
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command