fdvoid0's Projects
A curated list of awesome Security Hardening techniques for Windows.
windows kernel security development
AntSword 自定义编(解)码器分享
A collection of AWS penetration testing junk
Tool to perform lateral movement between AAD joined devices
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)
transform your payload.exe into one fake word doc (.ppt)
Simple linux backdoors and hiding techniques
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Windows 权限提升 BadPotato
BadUSB with WiFi that allows to execute payloads from SD
Bandit is a tool designed to find common security issues in Python code.
Binary Analysis Platform
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
Implement base64url changing +,/ to -,_ and removing = to be more URL friendly
Simple Bash Rasomware for use in Cyber Exercises
Automatically exported from code.google.com/p/bat2exe
go
Bouncy Castle C# Distribution (Mirror)
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
Hunts out CobaltStrike beacons and logs operator command output
Binary editor written in Go
Behinder source code
“冰蝎”动态二进制加密网站管理客户端
世界上最好用的php大马
Beta versions of my software
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.