Giter Site home page Giter Site logo

Mohammed Tanveer's Projects

ace-firefist icon ace-firefist

Attack chain emulator. Write recipes for initial access easily

comproxy icon comproxy

PoC for proxying COM objects when hijacking

ffw icon ffw

A fuzzing framework for network servers

gcpbucketbrute icon gcpbucketbrute

A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.

hunter icon hunter

(l)user hunter using WinAPI calls only

iofuzz icon iofuzz

A mutation based user mode (ring3) dumb in-memory IOCTL Fuzzer/Logger. This script attach it self to any given process and hooks DeviceIoControl!Kernel32 API and try to log or fuzz all I/O Control code I/O Buffer pointer, I/O buffer length that process sends to any Kernel driver.

ndis icon ndis

Windows Kernel Driver - Create a driver device in intermediate layer of Windows kernel based on NDIS, which communicates with and connect upper layer (user mode applications) and lower layer (miniport driver/network card). Create self-defined protocols for transmitting data and control communications by simulating very simple HTTP, TCP and ARP protocols. Try best to implement connection establishing mechanism and retry sending mechanism following TCP’s specification in order to achieve stable data transmission. So it can walk around system TCP protocol layer and firewall to capture and send custom data packets.

responder icon responder

Responder is a LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

sourcewolf icon sourcewolf

Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥

tdl icon tdl

Driver loader for bypassing Windows x64 Driver Signature Enforcement

unicorn icon unicorn

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.

windows-itpro-docs icon windows-itpro-docs

This repository is used for Windows client for IT Pro content on Microsoft Learn.

ysoserial.net icon ysoserial.net

Deserialization payload generator for a variety of .NET formatters

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.