PloitKit: The Hacker’s ToolBox
PloitKit is a Python-based GUI tool designed as one-stop for all other software. I was facing these kinds of problem when I need to switch to the different system, or...
Exploitation / Forensics / Information Gathering / Network PenTest / Reverse Engineering / Sniffing & Spoofing / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest / Wireless
by do son · Published April 25, 2018
PloitKit is a Python-based GUI tool designed as one-stop for all other software. I was facing these kinds of problem when I need to switch to the different system, or...
What’s OSUETA? Osueta it’s a simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack, present in OpenSSH versions <= 7.2 and >= 5.* . The script has the...
Windows Privilege Escalation Windows Privilege Escalation Techniques and Scripts CopyAndPasteFileDownloader.bat Windows file transfer script that can be pasted to the command line. File transfers to a Windows machine can be...
sRDI – Shellcode Reflective DLL Injection sRDI allows for the conversion of DLL files to position independent shellcode. Functionality is accomplished via two components: C project which compiles a PE...
Blackbone Windows memory hacking library Features x86 and x64 support Process interaction Manage PEB32/PEB64 Manage process through WOW64 barrier Process Memory Allocate and free virtual memory Change memory protection Read/Write...
gscript Genesis Scripting Engine Genesis Scripting (gscript for short) is a technology I’ve developed to enable more intelligent malware stagers. Typically, stagers are pretty dumb. Most stagers are unique to...
Exploitation / Network PenTest / Post Exploitation
by do son · Published March 25, 2018 · Last modified October 25, 2022
Invoke-DOSfuscation v1.0 Invoke-DOSfuscation is a PowerShell v2.0+ compatible cmd.exe command obfuscation framework. Over the past several years as an Incident Response consultant, I have witnessed a myriad of obfuscation and...
puzzCode(Puzzle Code) puzzCode is a simple compiler based on mingw, written in C# to build windows applications in such a way that they can’t be analyzed by standard analysis tools...
Exploitation / Information Gathering / Network PenTest / Post Exploitation
by do son · Published March 21, 2018
Red Team Scripts Red Team Scripts is a collection of red teaming related tools, scripts, techniques, and notes developed or discovered over time during engagements. Related tool release blog posts...
Exploitation / Network PenTest / Web Exploitation / WebApp PenTest
by do son · Published March 20, 2018
msf-autopwn Performs or reads a Nmap scan then automatically exploits machines that contain some of the most common vulnerabilities. Installation This install is only tested on Kali. Clone into the...
Sticky-Keys-Slayer Scans for accessibility tools backdoors via RDP stickyKeysSlayer.sh Establishes a Remote Desktop session (RDP) with the specified hosts and sends keypresses to launch the accessibility tools within the Windows...
Exploitation / Information Gathering / Network PenTest / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published March 18, 2018
EternalView EternalView is an all in one basic information gathering tool Features: Feature Explanation Whois Information Prints the whois information of the entered web address DNS lookup Prints the DNS...
Exploitation / Maintaining Access
by do son · Published March 16, 2018 · Last modified August 29, 2019
Powershell-RAT The python-based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during the red team engagements to backdoor any Windows machines. It tracks the user...
Exploitation / Reverse Engineering
by do son · Published March 15, 2018 · Last modified October 10, 2021
PESecurity PowerShell script to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, Authenticode, Control Flow Guard, and HighEntropyVA. Download git clone https://github.com/NetSPI/PESecurity.git Usage ...
reverse-shell Easy to remember reverse shell that should work on most Unix-like systems. Detects available software on the target and runs an appropriate payload. Download git clone https://github.com/lukechilds/reverse-shell.git Usage 1. Listen...