-
EY
- Melbourne, Australia
- https://umar0x01.sh
- @syed__umar
Highlights
Lists (1)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- AutoIt
- Batchfile
- BitBake
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- Common Lisp
- D
- Dart
- Dockerfile
- Fluent
- Go
- HCL
- HTML
- Haskell
- JCL
- Java
- JavaScript
- Julia
- Jupyter Notebook
- Kotlin
- Liquid
- Logos
- Lua
- Makefile
- Markdown
- Meson
- Nim
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Puppet
- Python
- Raku
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Sage
- Shell
- SourcePawn
- Swift
- SystemVerilog
- TeX
- TypeScript
- VBA
- Vala
- Vim Script
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zeek
- Zig
Kerberos unconstrained delegation abuse toolkit
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Write-ups of machines/challenges I completed on Hack The Box, TryHackMe, VulnLab, and HashX while learning for exams like CPTS and OSEP.
A C# light executable that read Windows 11 Notes from TabState directory.
Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
This program is designed to demonstrate various process injection techniques
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
Interract with Microsoft SQL Server (MS SQL) servers and their linked instances in restricted environments, without the need for complex T-SQL queries.
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Hackish way to intercept and modify non-HTTP protocols through Burp & others.
A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
Ne0nd0g / go-clr
Forked from ropnop/go-clrA PoC package for hosting the CLR and executing .NET from Go
Manipulating and Abusing Windows Access Tokens.
C# .Net Framework program that uses RunspaceFactory for Powershell command execution.
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications
Run a Exe File (PE Module) in memory (like an Application Loader)
Also known by Microsoft as Knifecoat 🌶️