The pentester's Swiss knife

Microsoft Graph exploitation

Graphpython: The Swiss Army Knife for Microsoft Graph Exploitation

Graphpython Graphpython is a modular Python tool for cross-platform Microsoft Graph API enumeration and exploitation. It builds upon the capabilities of AADInternals (Killchain.ps1), GraphRunner, and TokenTactics(V2) to provide a comprehensive solution for interacting with...

pentest scanner

nacs: event-driven pentest scanner

nacs: event-driven pentest scanner Detect if the target machine is alive Service scan (regular & non-regular ports) poc detection (xray & nuclei format) Weak password blasting for services such as databases Common Vulnerability Exploitation...

Legitimate WFP

EDRPrison: Silencing EDRs with Legitimate WFP Drivers

EDRPrison EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project focuses on network-based evasion techniques. Unlike its predecessors, EDRPrison installs and loads an...

HEVD Exploit - privilege escalation

HEVD Exploit: Escalating from Low Integrity to SYSTEM

HackSys Extreme Vulnerable Driver (HEVD) – BufferOverflowNonPagedPoolNx Exploit This repository contains an exploit for the BufferOverflowNonPagedPoolNx vulnerability in HackSys Extreme Vulnerable Driver (HEVD). The exploit targets Windows 10 Version 22H2 (OS Build 19045.3930) and demonstrates...