Git Product home page Git Product logo

dannymas

dannymas's Projects

sstimap icon sstimap

Automatic SSTI detection tool with interactive interface

standin icon standin

StandIn is a small .NET35/45 AD post-exploitation toolkit

starfighters icon starfighters

A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.

steganography icon steganography

:see_no_evil: Steganography: Hiding an image inside another

stego-toolkit icon stego-toolkit

Collection of steganography tools - helps with CTF challenges

stompy icon stompy

Timestomp Tool to flatten MAC times with a specific timestamp

storm-breaker icon storm-breaker

Tool social engineering [Access Webcam & Microphone & Os Password Grabber & Location Finder] With Ngrok

stormspotter icon stormspotter

Azure Red Team tool for graphing Azure and Azure Active Directory objects

subrake icon subrake

A Subdomain Enumeration and Validation tool for Bug Bounty and Pentesters.

sudo_killer icon sudo_killer

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

suid3num icon suid3num

A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( อก~ อœส– อกยฐ)

superman icon superman

๐Ÿค– Kill The Protected Process ๐Ÿค–

swaks icon swaks

Swaks - Swiss Army Knife for SMTP

swap_digger icon swap_digger

swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.

sweetpotato icon sweetpotato

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

sys-calls icon sys-calls

An example of using Syscalls in C# to get a meterpreter shell.

systemnightmare icon systemnightmare

Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows

systracingpoc icon systracingpoc

CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.