Giter Site home page Giter Site logo

LZ's Projects

ntlmrawunhide icon ntlmrawunhide

NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The following binary network packet capture formats are supported: *.pcap *.pcapng *.cap *.etl

other-projects icon other-projects

This project is just a dumping ground for random scripts I've developed.

otu-plz icon otu-plz

one-time use token phishing toolkit

pafishmacro icon pafishmacro

Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques implemented by malicious documents.

pe-sieve icon pe-sieve

Scans a given process, searching for the modules containing in-memory code modifications. When found, it dumps the modified PE.

phantom-evasion icon phantom-evasion

Python AV evasion tool capable to generate FUD executable even with the most common 32 bit metasploit payload(exe/elf/dmg/apk)

powerloaderex icon powerloaderex

PowerLoaderEx - Advanced Code Injection Technique for x32 / x64

powershdll icon powershdll

Run PowerShell with rundll32. Bypass software restrictions.

pupy icon pupy

Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python

redfile icon redfile

A flask wsgi application that serves files with intelligence, good for serving conditional RedTeam payloads

redsails icon redsails

RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: https://www.youtube.com/watch?v=Ul8uPvlOsug

regeorg icon regeorg

The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.

requests-ip-rotator icon requests-ip-rotator

A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.

robber icon robber

Robber is open source tool for finding executables prone to DLL hijacking

seth icon seth

Perform a MitM attack and extract clear text credentials from RDP connections

sigma icon sigma

Generic Signature Format for SIEM Systems

smbetray icon smbetray

SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over the wire in cleartext.

smbrat icon smbrat

A Windows Remote Administration Tool in Visual Basic

smogcloud icon smogcloud

Find cloud assets that no one wants exposed 🔎 ☁️

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.