V2EX claysec
 claysec 最近的时间轴更新
claysec's repos on GitHub
C 1385 人关注
BokuLoader
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Javascript 1267 人关注
Loki
♂ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
C 497 人关注
azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
C 469 人关注
spawn
Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, andexecutes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.
C 449 人关注
Ninja_UUID_Runner
Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!
Python 399 人关注
venom
Venom C2 is a dependencyfree Python3 Command & Control framework for redteam persistence
C 382 人关注
injectAmsiBypass
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
C 299 人关注
injectEtwBypass
CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
C 290 人关注
HOLLOW
EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode
C 283 人关注
StringReaper
Reaping treasures from strings in remote processes memory
C 226 人关注
AsmHalosGate
x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks
C 195 人关注
patchwerk
BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)
C 183 人关注
whereami
Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.
Assembly 132 人关注
winx64-InjectAllProcessesMeterpreter-Shellcode
64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.
C 110 人关注
halosgate-ps
Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes
C 106 人关注
HellsGatePPID
Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process
C 102 人关注
Nobelium-PdfDLRunAesShellcode
A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn
Javascript 100 人关注
XSS-Clientside-Attacks
A repository of Javascript XSS attacks against client browsers
C 90 人关注
xPipe
Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions
Assembly 65 人关注
x64win-DynamicNoNull-WinExec-PopCalc-Shellcode
64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free
Assembly 40 人关注
x64win-AddRdpAdminShellcode
64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"
Python 25 人关注
tailorMS-rXSS-Keylogger
Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 allows remote attackers to harvest keys pressed via unauthenticated victim clicking malicious URL and typing.
Python 21 人关注
StockManagement-XSS-Login-CredHarvester
Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 allows remote attackers to harvest login credentials & session cookie via unauthenticated victim clicking malicious URL and entering credentials.
16 人关注
DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bir + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
Python 15 人关注
gsSMTP-Csrf2Xss2RCE
15 人关注
OffensiveRust
Rust Weaponization for Red Team Engagements.
Python 13 人关注
LibreHealth-authRCE
LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) on the hosting webserver via uploading a maliciously crafted image.
13 人关注
SCMKit
Source Code Management Attack Toolkit
Python 11 人关注
gsCMS-CustomJS-Csrf2Xss2Rce
GetSimple CMS Custom JS Plugin Exploit RCE Chain
HTML 10 人关注
boku7.github.io
Blog
Python 10 人关注
CVE-2020-23839
Public PoC Disclosure for CVE-2020-23839 - GetSimple CMS v3.3.16 suffers from a Reflected XSS on the Admin Login Portal
Assembly 10 人关注
slae64
Repo for SLAE64 Exam
Python 9 人关注
GetSimple-SmtpPlugin-CSRF2RCE
GetSimple CMS My SMTP Contact Plugin <= v1.1.1 - CSRF to RCE
7 人关注
Ares
Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique
7 人关注
beacon
Former attempt at creating a independent Cobalt Strike Beacon
Python 7 人关注
BikeRental-FU-RCE
7 人关注
LoudSunRun
My shitty attempt at tampering with the callstack based on the work of namazso, SilentMoonWalk, and VulcanRaven
6 人关注
Apollo
A .NET Framework 4.0 Windows Agent
Python 6 人关注
onlineCourseReg-RCE
From 0 to Remote Code Execution - exploit development files for Online Course Registration Web Application RCE
5 人关注
DayBird
Extension functionality for the NightHawk operator client
5 人关注
GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
4 人关注
ADOKit
Azure DevOps Services Attack Toolkit
4 人关注
BOFMask
Python 4 人关注
fuzzingFTP
Python scripts for fuzzing FTP servers, with percision, over TCP
Python 4 人关注
homeRent-SQLi-RCE
House Rental v1.0 suffers from an unauthenticated SQL Injection vulnerability allowing remote attackers to execute arbitrary code on the hosting webserver via sending a malicious POST request.
C 3 人关注
AceLdr
Cobalt Strike UDRL for memory scanner evasion.
3 人关注
KernelCallbackTable-Injection
Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html
XSLT 3 人关注
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Assembly 3 人关
slae32
Repo for all SLAE32 Exam Assignments
Python 2 人关注
aCal-RCE
Exploit Development files for aCal web application - reflected XSS to RCE.
Shell 2 人关注
AV_Bypass-Splitter
Splitter script to identify Anti-Virus signature of an executable
2 人关注
Azur3Alph4
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
2 人关注
burp-jars
2 人关注
HellsGate
Original C Implementation of the Hell's Gate VX Technique
2 人关注
Malleable-C2-Profiles
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Cobalt Strike 3.x.
2 人关注
nt5src
Source code of Windows XP (NT5). Leaks are not from me. I just extracted the archive and cabinet files.
2 人关注
OSEP-Code-Snippets
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
2 人关注
RedLizard
RedLizard Rust TCP Reverse Shell Server/Client
2 人关注
StandIn
StandIn is a small .NET35/45 AD post-exploitation toolkit
PowerShell 2 人关注
TokenTactics
Azure JWT Token Manipulation Toolset
2 人关注
Windows_LPE_AFD_CVE-2023-21768
LPE exploit for CVE-2023-21768
1 人关注
BarracudaDrivev6.5-LocalPrivEsc
Insecure Service File Permissions in bd service in Real Time Logics BarracudaDrive v6.5 allows local attackers to escalate privileges to admin via replacing the bd.exe file and restarting the computer where it will be run as 'LocalSystem' on the next startup automatically.
1 人关注
CheatSheets
Cheat sheets for various projects.
1 人关注
cobalt_strike_extension_kit
Attempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
1 人关注
CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Files
1 人关注
CVE-2021-1675
Impacket implementation of CVE-2021-1675
1 人关注
ElevateKit
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
1 人关注
Havoc
The Havoc Framework
1 人关注
msspray
Password attacks and MFA validation against various endpoints in Azure and Office 365
1 人关注
PrintNightmare
1 人关注
SourcePoint
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
1 人关注
Talon
(Demo) 3rd party agent for Havoc
Python 1 人关注
xdev-templates
Random helpful xdev templates
Python 0 人关注
domQuestPro-SEH-BOF
0 人关注
EDRs
0 人关注
h0mbre.github.io
claysec

claysec

V2EX 第 210570 号会员,加入于 2017-01-12 17:59:08 +08:00
根据 claysec 的设置,主题列表被隐藏
二手交易 相关的信息,包括已关闭的交易,不会被隐藏
claysec 最近回复了
去大医院看看吧。别瞎搞
@lauix 那这样的话我建议搞个一键下载的功能,然后可以优化下单个下载的时候不允许点击其他下载,我觉得这样的逻辑会好很多
2023-10-25 12:59:18 +08:00
回复了 Jaeger 创建的主题 程序员 语雀当机, Notion 莫名躺枪, Obsidian 成为最大赢家
我已经用 SIYuan + S3 方式进行异地备份,S3 那边考虑在开多一个异地桶进行桶和桶之间的备份
@Rooger 厉害啊,自律得这么好,我想问问的就是背英语四级常用单词这个,是每天都在地铁里面碎片化学习吗,用的是什么软件,我有用过一些软件但是我都觉得不太符合我的习惯
2023-09-19 10:53:20 +08:00
回复了 mdi0678713 创建的主题 问与答 大家前进的动力,都是什么?
@coderluan
@xuzb0312 太真实了。我现在每天都是这样
关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     2448 人在线   最高记录 6679       Select Language
创意工作者们的社区
World is powered by solitude
VERSION: 3.9.8.5 21ms UTC 02:24 PVG 10:24 LAX 18:24 JFK 21:24
Do have faith in what you're doing.
ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86