There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Linux-Privilege-Escalation-Basics
Simple and accurate guide for linux privilege escalation tacticsLFI---RCE-Cheat-Sheet
Transition form local file inclusion attacks to remote code exectionReverse-Shell-TTY-Cheat-Sheet
Simple TTY cheat sheet for shell stabilizationDefenderATP-Proactive-Threat-Hunting-Queries-KQL
List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by developing custom TTP'S from red-teaming engagements & simulations with the strategic goal to prevent threats before they have the opportunity to executeFail2Ban-Filters
Fail2Ban Filters to help Protect your Apache Web Servers from Scanners such as nmap , sqlmap , nikto , vega, and other Vulnerability Scanners by blocking the Source IP AddressWindows-Privilege-Escalation-Basics
Simple and accurate guide to elevate permission to NT AUTHORITY\SYSTEMCyber_Threat_Intelligence
Simple Bash Script that pulls Open-Source Feeds from the web That can be used by SOC-Teams to Enhance their Existing SIEM Solutions by Adding Extra IntelligenceLinux-System-Lockdown
Simple bash script to help you add other layer of OS security to prevent possible privilege escalation after a compromiseXSS---Basics
Basic overview of XSSExcel-Reverse-Shell-VBA-
Simple VBA to execute OS command and download a remote fileReverse-Shell-Cheat-Sheet
Basic reverse shells for any scenarioHydraSpliot
Simple BlueKeep / EternalBlue Expliot Scanner & Expliotation ToolSSTI-Exploitation
Basic overview of SSTI to RCELinux_Enumeration
Bash Script that pulls System Information about your VictimWindows-Enumeration
Simple Batch Script that Pulls Information about Your Target after you have Established a Reverse ShellLove Open Source and this site? Check out how you can help us