-
Rapid7
- Cleveland, Ohio
-
09:33
- 4h behind - https://zerosteiner.com/
- @zeroSteiner
- @zeroSteiner@infosec.exchange
Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
Compilation of BIOSes for various emulation platforms
Lists who can read any gMSA password blobs and parses them if the current user has access.
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
Operating System Design Review: A systemic analysis of modern systems architecture
Streamlit App for GitHub Repository Search Tailored to User Criteria
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
The cheat sheet about Java Deserialization vulnerabilities
This project aims to compare and evaluate the telemetry of various EDR products.
Generate Podman Quadlet files from a Podman command, compose file, or existing object
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
Made to be used with Flipper just drag the folder into NFC
A multi-arch assembly REPL and emulator for your command line.
Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll
Terminator plugin to open files specified by a given regex in an editor
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
This repo contains some Amsi Bypass methods i found on different Blog Posts.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
📡 PoC auto collect from GitHub.
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus …
Exchange your privileges for Domain Admin privs by abusing Exchange