еверсинц33's Projects
Using the Counter Strike 1.6 RCON protocol as a C2 Channel.
Experimental Windows x64 Kernel Rootkit.
Nim Library for Offensive Security Development
Database of Black Metal lyrics and additional metadata in .JSON-format for computer assisted text analysis projects.
Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).
Coerce Windows machines auth via MS-EVEN
Generate password spraying lists based on the pwdLastSet-attribute of users.
Your automated network enumeration watchtower.
Deepsearch leak database client, as an alternative for pwndb
Dockerfile and ressources for Dnscat2
Some writeups for the 2019 European Cyber Week qualification CTF.
A Purposefully Vulnerable Blockchain
Ghidra .gdt files for parts of the Kernel Mode Driver Framework (KMDF) part of WDF
Tool for playing with Windows Access Token manipulation.
XOR decrypting shellcode using the GPU with OpenCL.
GraphQL automated security testing toolkit
Auto-Dash-Bot for Hyper Light Drifter.
Enumerate domain machine accounts and perform pre2k password spraying.
A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
Docker container escape enumeration tool.
A tool to perform Kerberos pre-auth bruteforcing
This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or pentest the security of a LoraWAN infrastructure.
WIP: Directory fuzzer for single page apps that require a browser to render content, with an interface similar to ffuf
My adventures in learning about different userland malware techniques, such as syscalls, injection, unhooking or sandbox evasion.
Monero: the secure, private, untraceable cryptocurrency