Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 40 million developers.
Hide content and notifications from this user.
Learn more about blocking users
Contact Support about this user’s behavior.
Learn more about reporting abuse
For blog post
(Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized …
powershell codes of my blog.
Python codes of my blog.
My exercise of using Exchange Web Service(EWS)
A collection of pentest and development tips
Use to perform Microsoft exchange account brute-force.
C/C++ code examples of my blog.
An asynchronous post-exploitation agent powered by Python, IronPython, C# and .NET's DLR
An example of a downloader written in NodeJS.
To do list of my research. Any feedback, bug reports or suggestions are welcome.
C Sharp codes of my blog.
Go code examples of my blog.
Remove individual lines from Windows Event Viewer Log (EVT) files
Remove individual lines from Windows XML Event Log (EVTX) files
Use subProcessTag Value From TEB to identify Event Log Threads
Asynchronous Procedure Calls
Enumerate all processes and get specified file's handle,then close it.
Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.
Steal NTLM Hashes with Bad-PDF
Search for available domain from expireddomains.net
Learn from Casey Smith@subTee
Use powershell to list the RDP Connections History of logged-in users or all users
Use powershell to send mail
2 ways of Password Filter DLL to record the plaintext password