• Stars
    star
    3
  • Rank 3,952,204 (Top 79 %)
  • Language
    Python
  • Created about 9 years ago
  • Updated about 9 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

An HMAC authentication header plugin for Burp Proxy, written in Python.

More Repositories

1

CSExec

An implementation of PSExec in C#
C#
312
star
2

ManagedInjection

A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge
C#
164
star
3

NamedPipes

A pattern for client/server communication via Named Pipes via C#
C#
96
star
4

UnstoppableService

A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.
C#
66
star
5

WMIProcessWatcher

An example pattern in C# for using WMI to monitor process creation and termination events.
C#
50
star
6

DnsCache

C++
44
star
7

AntiDebug

PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.
C#
34
star
8

WcfScan

A tool for scanning NET.TCP WCF endpoints to test the security of their binding configurations.
C#
28
star
9

WidgetSender

Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms
C#
22
star
10

ActiveDirectoryServices

A more full featured C# API for connecting to and managing Active Directory (AD) and Lightweight Directory (AD-LDS) instances, complete with consumer application examples.
C#
22
star
11

Periscope

C#
20
star
12

ChromePasswords

C
20
star
13

WhoDis

An example pattern in C# for watching security events (logon/logoff/privilege)
C#
19
star
14

BlueScreenOnExit

PoC of a protected process causing a blue screen if killed.
C#
16
star
15

RunAs

An example in C# for programmatically calling UAC to escalate to admin
C#
15
star
16

CertCheck

Programmatically access a TLS certificate chain in C++ and C#
C++
15
star
17

SneakyService

A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows services.
C#
14
star
18

DieHard

PoC: process watcher patterns to make killing a process hard.
C#
12
star
19

TLAD

The Totally Legit Authentication Dialog
C#
12
star
20

fake-ransomware

C#
11
star
21

ProtectProcessFromJoeUser

PoC: Protecting Joe User from killing his own process.
C#
10
star
22

kata

A collection of breach and post-exploitation kata for the red teamer to constantly train to maintain proficiency.
8
star
23

LuhnForce

A C# tool for brute forcing Credit Card numbers with valid Luhn checks.
C#
7
star
24

PlanetExpressStockTracker

A silly little example how to trojan a C# windows app, as demonstrated at the southwest region CCDC competition.
C#
5
star
25

Trojan-RetailDiagnostics

C#
5
star
26

HeapSurf

A credit card memory scraper written in C#
C#
5
star
27

SpoofParentProcess

C++
3
star
28

netstat

C++
2
star
29

WindowsSessions

C++
2
star
30

taskkill

C++
2
star
31

SunburstStrings

C#
1
star
32

screenshot

C++
1
star
33

HappySad

Sometimes you just need a Happy EXE and a Sad EXE
C++
1
star