{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"No-Consolation","owner":"fortra","isFork":false,"description":" A BOF that runs unmanaged PEs inline ","allTopics":["pe-loader","cobalt-strike","cna","bof"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":501,"forksCount":58,"license":"MIT License","participation":[0,0,0,0,0,0,0,2,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,1,5,4,1,4,1,3,1,0,0,2,2,0,0,0,0,0,0,0,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-14T23:32:18.120Z"}},{"type":"Public","name":"CVE-2024-30051","owner":"fortra","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":89,"forksCount":26,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,10,0,0,6,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-05T23:21:00.882Z"}},{"type":"Public","name":"impacket","owner":"fortra","isFork":false,"description":"Impacket is a collection of Python classes for working with network protocols.","allTopics":["smb","wmi","kerberos","pass-the-hash","impacket","netbios","dcom","msrpc","dcerpc","python"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":144,"issueCount":188,"starsCount":13291,"forksCount":3539,"license":"Other","participation":[1,1,5,2,1,1,1,1,1,0,0,0,0,0,0,0,1,1,0,1,1,0,1,2,4,0,2,3,0,6,2,3,6,4,6,4,0,1,0,0,3,0,3,1,6,7,4,6,4,12,9,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-05T15:17:44.128Z"}},{"type":"Public","name":"nanodump","owner":"fortra","isFork":false,"description":"The swiss army knife of LSASS dumping","allTopics":["cobalt-strike","cna","bof","lsass"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":1737,"forksCount":236,"license":"MIT License","participation":[0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0,0,0,0,1,0,0,0,0,0,0,0,0,0,1,0,1,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-03T21:06:55.549Z"}},{"type":"Public","name":"ABO-collection","owner":"fortra","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,82,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-14T17:25:50.252Z"}},{"type":"Public","name":"CVE-2024-6768","owner":"fortra","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":11,"forksCount":3,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,0,0,0,5,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-12T20:48:52.084Z"}},{"type":"Public","name":"CreateProcess","owner":"fortra","isFork":false,"description":"A small PoC that creates processes in Windows","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":173,"forksCount":34,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-06T14:29:20.869Z"}},{"type":"Public","name":"hw-call-stack","owner":"fortra","isFork":false,"description":"Use hardware breakpoints to spoof the call stack for both syscalls and API calls","allTopics":["syscalls","edr-bypass","stack-spoofing"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":177,"forksCount":28,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-06T14:28:44.834Z"}},{"type":"Public","name":"CVE-2022-30136","owner":"fortra","isFork":false,"description":"Windows Network File System Remote exploit for CVE-2022-30136","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":11,"forksCount":13,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-11T16:57:26.434Z"}},{"type":"Public","name":"CVE-2022-21907","owner":"fortra","isFork":true,"description":"A REAL DoS exploit for CVE-2022-21907","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":38,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-11T16:55:57.578Z"}},{"type":"Public","name":"CVE-2022-37969","owner":"fortra","isFork":false,"description":"Windows LPE exploit for CVE-2022-37969","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":126,"forksCount":38,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-11T16:50:28.186Z"}},{"type":"Public","name":"CVE-2023-28252","owner":"fortra","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":170,"forksCount":46,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-10T16:57:44.999Z"}},{"type":"Public","name":"Reversing-and-Exploiting-with-Free-Tools-Series","owner":"fortra","isFork":false,"description":"Tips and tricks on reversing and exploiting Windows using free and easy to get tools.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":22,"forksCount":7,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-21T13:00:35.663Z"}},{"type":"Public","name":".github","owner":"fortra","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-21T12:11:47.010Z"}}],"repositoryCount":14,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"fortra repositories"}