UAC bypass, Elevate, Persistence methods
-
Updated
Jun 4, 2024 - C#
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
UAC bypass, Elevate, Persistence methods
Official website of TWC
Real-world infosec wordlists, updated regularly
Fileless Open-Source Stealer, all logs will be sent using discord webhooks
Various wordlists FR & EN - Cracking French passwords
An auto-updating list of shodan dorks with info on the amount of results they return!
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
Discover new target domains using Content Security Policy
Update free every 2 hours
GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to detect harmful security vulnerabilities using Google Dorks techniques. It has methods to bypass google captcha and search in a list of any possible program in wild.
Hourly updated database of exploit and exploitation reports
This repository serves as my personal knowledge base, continually evolving as I delve deeper into the fascinating realm of ethical hacking.
This has everything related to Windows Server management | Capture the flags (CTF) | AWS Advanced Knowledge - these writeups are for my own note taking
Cheat sheet for xonsh shell with copy-pastable examples. The best doc for the new users.
Security Scanning Samples with cnspec, cnquery, and Mondoo Platform
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现
Get PROXY List that gets updated everyday
the only repository you've ever needed. supercharge your application today with this ultra performant library.