• Stars
    star
    4
  • Rank 3,303,679 (Top 66 %)
  • Language
    C
  • Created 30 days ago
  • Updated 29 days ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Repository to gather the BOF files I will be developing

More Repositories

1

instagram-followers-bot

A bot for Instagram. You can follow users using a tag or in a specific location, unfollow those who dont follow-you-back, and follow-back those who follow you
Python
480
star
2

NativeDump

Dump lsass using only Native APIs by hand-crafting Minidump files (without MinidumpWriteDump!!!)
C#
447
star
3

wifi-pentesting-guide

WiFi Penetration Testing Guide
Python
401
star
4

TrickDump

Dump lsass using only NTAPIS running 3 programs to create 3 JSON and 1 ZIP file... and generate the Minidump later!
C#
326
star
5

WhoamiAlternatives

Different methods to get current username without using whoami
C#
171
star
6

adfsbrute

A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.
Python
163
star
7

covert-tube

Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
Python
105
star
8

SharpCovertTube

Youtube as C2 channel - Control Windows systems uploading videos to Youtube
C#
75
star
9

twitter-followers-bot

A bot for Twitter. You can follow users in a specific location or tweeting specific words and unfollow those who do not follow you back (and are not included in whitelist.txt). Also generates REPORTS!
Python
65
star
10

covert-control

Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
Python
62
star
11

wpa2-enterprise-attack

Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
Shell
52
star
12

instagram-user-id

Get the user ID of any user in instagram
Python
32
star
13

SharpSelfDelete

PoC to self-delete a binary in C#
C#
25
star
14

http-protocol-exfil

Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)
Python
21
star
15

p-invoke.net

P/Invoke definitions from the now offline pinvoke.net - Website: https://www.p-invoke.net/
20
star
16

spotify-playlist-downloader

Downloading Spotify Playlists
Python
18
star
17

OSED-prep

Exploits written while preparing for the OSED exam
Python
17
star
18

ddos_simulation

DDoS simulation written in Python using "scapy" and "multiprocessing" libraries. Used for educational purposes
Python
16
star
19

Tinder-Searcher-and-DB-creation

Tinder user searcher and DB creation. Proof of concept for Tinder security team
Python
16
star
20

subdoler

Easy subdomain finder from a list of company names, IP ranges or domains.
Python
15
star
21

slae32

The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec
Python
15
star
22

Portswigger-Labs

All Apprentice and Practitioner-level Portswigger labs
14
star
23

vulnserver-exploits

Vulnserver exploits
Python
13
star
24

SSSD-creds

Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems
Shell
12
star
25

SharpNado

Repository to gather the .NET malware I will be developing
12
star
26

SharpObfuscate

Obfuscate payloads using IPv4, IPv6, MAC or UUID strings
C#
11
star
27

ntds-analyzer

A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.
Python
11
star
28

s7-parser

Parser of the industrial protocol S7 (S7comm) using Libpcap
C
10
star
29

MinidumpParser

C# program to parse Microsoft Minidump files and their streams
C#
9
star
30

SharpNtdllOverwrite

Overwrite ntdll.dll's ".text" section to bypass API hooking. Getting the clean dll from disk, Knowndlls folder, a debugged process or a URL
C#
8
star
31

triangle-position

Triangle a coordinate given 3 or 4 coordinates
Python
8
star
32

jeringuilla

Process injection framework in C#. It uses dynamic function loading using delegates and AES-encryption for strings and payloads
C#
8
star
33

omrs-rce-exploit

Online Marriage Registration System (OMRS) 1.0 - Remote code execution
Python
6
star
34

arduino-rubber-ducky-scripts

david hasselhoff wallpaper using arduino pro micro
C++
6
star
35

pywisam

A Wifi pentesting framework written in Python
Python
6
star
36

GetModuleHandle

GetModuleHandle implementation in C# using only NtQueryInformationProcess by walking the PEB
C#
6
star
37

LM_original_password_cracker

Having the NTLM and a cracked LM hash it is possible to get the original password by testing all the combinations of upper and lowercases. This is useful if a ntds.dit file has both NTLM and LM hashes
Python
6
star
38

SharpProcessDump

Dump memory regions of a process using NtQueryVirtualMemory and NtReadVirtualMemory
C#
5
star
39

instagram-liker-all-posts

Like all posts of a user given the username in Instagram
Python
5
star
40

ubucryptor

File encryptor and decryptor in Linux with Python. Using the same file extensions than Wannacry
Python
5
star
41

github-bot

Easy bot for starring or branching a huge number of repositories. Using pyGithub
Python
5
star
42

webmin-tor-bruteforce

Script to bruteforce Webmin allowing to rotate the IP address using Tor
Python
5
star
43

GetProcAddress

GetProcAddress implementation in C# walking the PEB using only NtReadVirtualMemory
C#
5
star
44

textpattern-exploit-rce

Textpattern <= 4.8.3 Remote code execution (Authenticated)
Python
5
star
45

StealthyEnv

Stealthier alternative to whoami.exe in C#, it gets environment variables from PEB (PRTL_USER_PROCESS_PARAMETERS)
C#
4
star
46

SharpADS

Read, write and delete Alternate Data Streams (ADS) within NTFS, to hide malicious payloads
C#
4
star
47

CESP-ADCS-cheatsheet

Cheatsheet for Altered Security's CESP ADCS course
4
star
48

ipv4info_scraper

Get the IP blocks and domains from a company name by scrapping IPv4info
Python
4
star
49

SharpEA

Read, write and delete Extended Attributes (EAs) within NTFS, to hide malicious payloads
C#
4
star
50

coinhive-example

Easy example using Coinhive in a simple page
HTML
4
star
51

google-recaptcha-bypass

Trying to bypass Google Recaptcha. Different approaches in every commit, most of them not working heheh D:
Python
4
star
52

pyNtdllOverwrite

Overwrite ntdll.dll's ".text" section to bypass API hooking. Getting the clean dll from disk, Knowndlls folder or a debugged process
Python
4
star
53

goNtdllOverwrite

Overwrite ntdll.dll's ".text" section to bypass API hooking. Getting the clean dll from disk, Knowndlls folder or a debugged process
Go
3
star
54

CVE-2019-19033

CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)
Python
3
star
55

username-generator

Generate list of possible usernames for attacks such as password spraying
Python
3
star
56

mlhe_psnr

It converts (MP4 -> YUV) and (MP4 -> MLHE -> YUV). Then it calculates the PSNR
Python
3
star
57

NoSQL-injection-example

MongoDB injection example
JavaScript
3
star
58

nodejs_webshell

Node.js webshell created using AngularJS. It is a MEAN app (MongoDB + Express + AngularJs + Node.js) with a CLI in a text box
HTML
3
star
59

lsass-dumper

Dump lsass.exe generating a file with the hostname and date in txt format using C++.
C++
3
star
60

CVE-2021-31159

Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159) - https://ricardojoserf.github.io/CVE-2021-31159/
Python
3
star
61

dns-exfiltration

Notes and custom scripts for DNS exfiltration
Python
2
star
62

botnet-ssh-control

Botnet Command and Control (C&C) controlled via SSH. Based in Paramiko library
Python
2
star
63

wordpress-custom-bruteforce

Script to bruteforce Wordpress allowing to rotate the IP address using Tor
Python
2
star
64

twitter-detector

Create a Twitter listener to detect people tweeting specific words or in a location, then analyze the users data.
Python
2
star
65

instagram-access-token

Get the access token of your Instagram App
Python
2
star
66

elgamal-golang

A Golang implementation of Elgamal algorithm: encryption, decryption and signature generation and verification
Go
2
star
67

rop-emporium-exploits

Rop Emporium - Exploits and brief Walkthroughs
Python
2
star
68

dni-spain-wordlist

DNI (Spanish ID card) generator and wordlists
Python
2
star
69

lsass-dumper-csharp

Custom lsass.exe dump using C#: XOR-encoding, Dynamic function resolution, using NTAPIs...
C#
2
star
70

CVE-2021-40845

AlphaWeb XE, the embedded web server running on AlphaCom XE, has a vulnerability which allows to upload PHP files leading to RCE once the authentication is successful - https://ricardojoserf.github.io/CVE-2021-40845/
Python
2
star
71

GetModuleHandleRemote

GetModuleHandle implementation in C# for remote processes using only NTAPIs
C#
1
star
72

ricardojoserf.github.io

My blog :)
SCSS
1
star
73

niidoru

Framework for Process Injection in Windows using Go
Go
1
star
74

writeups

Vulnhub and HTB writeups
Python
1
star
75

GetProcessByName

Get process handle(s) from process name using NtGetNextProcess and GetProcessImageFileName
C#
1
star
76

url-storing-android-app

App for storing urls (developed in ~2014)
Java
1
star
77

location-android-app

Location Android Application (developed in the summer of 2017)
Java
1
star
78

random

Random stuff
PowerShell
1
star
79

pylangame

Game to learn vocabulary in any language using Google Translator API
Python
1
star
80

teleasistencia-App_PE

App Android y Procesador de Eventos para un sistema de Teleasistencia
HTML
1
star
81

GuardPagesHooking

C# implementation of Guard Pages API Hooking
C#
1
star
82

elgamal-python

A Python implementation of Elgamal algorithm: encryption, decryption and signature generation and verification
Python
1
star
83

textpattern-bruteforce

Script to bruteforce websites using TextPattern CMS.
Python
1
star
84

non-ms-binaries

Code snippet to create a process using the "PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON" flag
C#
1
star
85

go-GetProcessByName

Get process handle(s) from process name using NtGetNextProcess and GetProcessImageFileName
Go
1
star
86

twitter-database-generation

Twitter database generation using Tweepy libraries
Python
1
star
87

sitc_nahr

Twitter Sentiment Anallysis for SITC
Jupyter Notebook
1
star
88

global-app

App developed for a bus company in 2014 using Apache Cordova ,updated in 2017. Sending a request to an url and scraping the response
CSS
1
star
89

file-hider

Hide your files in infinite folders. It creates one folder for every character recursively, so the true file gets stored in the initial route and in the other folders a fake file (with the same name and size) gets stored.
Python
1
star
90

ricardojoserf

Github profile readme
1
star