Stars
Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]
Vulnerable driver research tool, result and exploit PoCs
Quickly discover exposed hosts on the internet using multiple search engines.
ScareCrow - Payload creation framework designed around EDR bypass.
Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
An OSINT tool to search for accounts by username and email in social networks.
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Some useful scripts for CobaltStrike
API samples for the Universal Windows Platform.
Kerberos relaying and unconstrained delegation abuse toolkit
pwning IPv4 via IPv6
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
LSASS memory dumper using direct system calls and API unhooking.
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
Enumerate and disable common sources of telemetry used by AV/EDR.
A method of bypassing EDR's active projection DLL's by preventing entry point exection
🐟 PoC of a VBA macro spawning a process with a spoofed parent and command line.
Command line interface to dump LSASS memory to disk via SilentProcessExit
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.