xct's Projects
Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.
Official repository for the Advanced Software Exploitation (ASE) course
My solutions for Advent of Code 2019
This time in rust...
Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format
some example binaries for testing symbolic execution based programs
Plantronics Desktop Hub LPE
Loads a custom dll in system32 via diaghub.
Simple Driver that elevates any process to SYSTEM
framework that evaluates fuzzers by comparing achieved code coverage and found bugs
A PoC package for hosting the CLR and executing .NET from Go
sqlite3 driver for go using database/sql
generate payloads that force authentication against an attacker machine
Encrypt jekyll-posts with AES
CyberSec & AI Prague Competition: https://www.kaggle.com/c/cybersecprague2019-challenge
my kali desktop setup
Simple AV Evasion for PE Files
OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
Finds paths through programs while detecting crashes.
rcat
Automatic exploit generation for simple linux pwn challenges.
take a screenshot via windows apis & save as .jpg
Get SYSTEM via SeDebugPrivilege
SeManageVolumePrivilege to SYSTEM
SeRestorePrivilege to SYSTEM
Basic educational coverage driven fuzzer
Adversary Emulation Framework
Runs sshd as a unprivileged user for persistence
my exercise solutions for the tml course