-
安全漫道.team
- p001water.github.io
Lists (7)
Sort Name ascending (A-Z)
Stars
The goal of this repository is to document the most common techniques to bypass AppLocker.
Find, verify, and analyze leaked credentials
Hide your Powershell script in plain sight. Bypass all Powershell security features
A OSINT project that explores how to dump data from React
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes
Winners of the International Obfuscated C Code Contest
Embedded graphics library to create beautiful UIs for any MCU, MPU and display type.
aria2 is a lightweight multi-protocol & multi-source, cross platform download utility operated in command-line. It supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink.
A Bypass Anti-virus Software Lateral Movement Command Execution Tool
Easily and securely send things from one computer to another 🐊 📦
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Interesting APT Report Collection And Some Special IOCs
A self hosted virtual browser that runs in docker and uses WebRTC.
Indicators of Compromises (IOC) of our various investigations
1 min voice data can also be used to train a good TTS model! (few shot voice cloning)