GithubHelp home page GithubHelp logo

emdnaia's Projects

.net_profiler_dll_loading icon .net_profiler_dll_loading

.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypass UAC and getting admin privileges.

ad-canaries icon ad-canaries

The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Canary objects.

ad_miner icon ad_miner

AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses

adcsync icon adcsync

Use ESC1 to perform a makeshift DCSync and dump hashes

adfsdump-ps icon adfsdump-ps

PowerShell Implementation of ADFSDump to assist with GoldenSAML

adokit icon adokit

Azure DevOps Services Attack Toolkit

adpt icon adpt

DLL proxying for lazy people

ahhhzure icon ahhhzure

AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts to brush up their cloud sec skills.

al-khaser icon al-khaser

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

amnesiac icon amnesiac

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments

android-malware-detection icon android-malware-detection

This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.

ansible-havoc icon ansible-havoc

Scripts I use to deploy Havoc on Linode and setup categorization and SSL

arjun icon arjun

HTTP parameter discovery suite.

artillery icon artillery

CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.

atlasldr icon atlasldr

Reflective x64 loader implemented using dynamic indirect syscalls

autobloody icon autobloody

Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.