
- Beijing
- https://vbtyblog.blogspot.com/
Starred repositories
A decentralized basic Trojan framework that eliminates C2 mode and is implemented by P2P, the core networking technology of blockchain
A major platform RAT Tool based by Blockchain/P2P.Now support Windows/Linux/MacOS
Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。网络资产探测32种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exc…
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
Listing UDP connections with remote address without sniffing.
Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
A Bypass Anti-virus Software Lateral Movement Command Execution Tool
Program for determining types of files for Windows, Linux and MacOS.
Fingerprinter is a simple remote os-fingerprinting and remote cloudprovider-detection tool. It uses the TTL-value of the IPv4-header to detect whether a Ubuntu or a Windows system is used. For the …
BeCyIconGrabber allows you to extract icons from almost any file!
Stealing Signatures and Making One Invalid Signature at a Time
A POC to disable TamperProtection and other Defender / MDE components
Small and highly portable detection tests based on MITRE's ATT&CK.
mkaring / ConfuserEx
Forked from yck1509/ConfuserExAn open-source, free protector for .NET applications
Writing custom backdoor payloads with C# - Defcon 27 Workshop
a repository that contains the program.cs source file that has D/Invoke bare minimum implementation and AES encryption for shellcode execution
Starred topics
