Stars
My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3puXLI0JyltbNJOC2R2HVFk
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the outside, and any internal host in a network, by pivoting from…