Stars
A curated list of tools for incident response
Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in order to find the patterns.
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Project for tracking publicly disclosed DLL Hijacking opportunities.
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 20…
这是一个基于gh0st远程控制的项目,使自己更深入了解远控的原理,采用VS2017,默认分支hijack还在修改不能执行,master分支的项目可以正常的运行的,你可以切换到该分支查看可以执行的代码
Self-developed tools for Lateral Movement/Code Execution
Command line interface to dump LSASS memory to disk via SilentProcessExit
955 不加班的公司名单 - 工作 955,work–life balance (工作与生活的平衡)
Getting started with static program analysis. 静态程序分析入门教程。
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Asynchronous Password Spraying Tool in C# for Windows Environments
Privilege Escalation Enumeration Script for Windows
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…