- (x(x_(x_x(O_o)x_x)_x)x)
- https://ppn.snovvcrash.rocks
- @snovvcrash
- @[email protected]
Stars
- All languages
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- D
- Dockerfile
- Go
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- Pony
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Standard ML
- Swift
- TypeScript
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic .NET
- Vue
- YARA
Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support
PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.
.NET assembly loader with patchless AMSI and ETW bypass
Transfer files to and from a Windows host via ICMP in restricted network environments.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Admin to Kernel code execution using the KSecDD driver
Small toolkit for extracting information and dumping sensitive strings from Windows processes
myADMonitor is an open-source Active Directory changes tracking tool
Monitor changes in Active Directory with replication metadata
Infinitely transfer between every device over pure HTTP with pipes or browsers
Free, Open Source, User-Mode SMB 1.0/CIFS, SMB 2.0, SMB 2.1 and SMB 3.0 server and client library
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection support.
smbclient-ng, a fast and user friendly way to interact with SMB shares.
The Definitive Guide To Process Cloning on Windows
Unorthodox and stealthy way to inject a DLL into the explorer using icons
Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals …