ice-wzl's Projects
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
This repo details an issue in the Cmder application (Full and Mini) in which a DLL is seached for and not found allowing an attacker the ability to get code execution
A complete computer science study plan to become a software engineer.
My respository for various small projects as I learn C++
DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shodan search with web scraping techniques to efficiently gather information from targeted websites.
Disable Windows Defender (+ UAC Bypass, + Upgrade to SYSTEM)
Freedom Fighting Mode: open source hacking harness
A collection of scripts which may come in handy during your freedom fighting activities.
Decodes Mikrotik support RIF files
Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
Config files for my GitHub profile.
🚩🐺 shell generator for CTFs!
Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)
Javascript monero webminer
Tools and Techniques for Red Team / Penetration Testing
This repository contains a working POC for a Denial of Service condition bug that is found on the SMB service for RouterOS devices.
Fully Undetectable Native C++ Remote Access Agent / Botnet.
Python web bot that uses Selenium to view web pages and mimic a human reader. This bot will route its traffic through Tor.
Tiny SHell is an open-source UNIX backdoor.
Small script to parse u|w|btmp identifying counts of logins from specific ips, logon times from a specific host, and outside working hour login detection
PowerShell Script to enumerate a Windows host and detect potential malware, characterize the system, and learn about key configurations.
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.