m40l0ng Goto Github PK
Name: m40L0ng
Type: User
Name: m40L0ng
Type: User
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Active Directory ACL Visualizer and Explorer - who's really Domain Admin?
Backdoor PHP shell script.
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
Popular Android malware seen in 2020
Scanning APK file for URIs, endpoints & secrets.
Arsenal is just a quick inventory and launcher for hacking programs
A RedTeam Toolkit
Awesome AV/EDR/XDR Bypass Tips
A curated list of awesome YARA rules, tools, and people.
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Cordova plugin that allows camera interaction from HTML code
A swiss army knife for pentesting networks
vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using social engineering techniques.
Flipper Zero Unleashed Firmware
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
Ghidra is a software reverse engineering (SRE) framework
A fork of AFL for fuzzing Windows binaries
Original C Implementation of the Hell's Gate VX Technique
Dynamically convert a native EXE to PIC shellcode by appending a shellcode stub
🔥 The fastest and powerful Python library for Instagram Private API 2023
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.