Skip to content
View snovvcrash's full-sized avatar
💭
Thinking in graphs
💭
Thinking in graphs

Block or report snovvcrash

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
snovvcrash/README.md
 _________________________
/ So, do you really think \
\ androids dream of us?   /          ________________________________
 -------------------------          < Anyways, I'm too hot for them. >
                        /            --------------------------------
                       /              \            .    .     .
                      /                \      .  . .     `  ,
                 __                     \    .; .  : .' :  :  : .
     .'@@@@@@`./UooU                     \   i..`: i` i.i.,i  i .
    (@@@@@@@@@@)\__/                      \   `,--.|i |i|ii|ii|i:
     (@@@@@@@@)                                UooU\.'@@@@@@`.||'
     `YY~~~~YY'                                \__/(@@@@@@@@@@)'
      ||    ||                                      (@@@@@@@@)
                                                    `YY~~~~YY'
                                                     ||    ||

:octocat: Gists of Interest

Gist Description
elevator_decrypt_key.cpp Unprotect the App-Bound Encryption Key via an RPC call to Google Chrome Elevation Service (PoC).
secretsdump-no-smb.patch DCSync without SMB interaction (impacket-secretsdump).
sspi.py Minified version of Python SSPI lib stolen from @ly4k's Certipy.

🐳 Docker Hub

Image Alias
physmem2profit docker run --rm -it -v `pwd`:/app/output --privileged snovvcrash/physmem2profit
ollvm13 docker run --rm -it -u `id -u` -v /tmp:/build -v `pwd`:/tmp snovvcrash/ollvm13 x86_64-w64-mingw32-clang
divideandscan docker run --rm -it --name das -v ~/.das:/root/.das -v `pwd`:/app -p 8050:8050 snovvcrash/divideandscan
pcredz docker run --rm -it --network host -v ~/.pcredz:/root/.pcredz snovvcrash/pcredz

🔧 .dotfiles

~/.* | %USERPROFILE%\.*

📈 Stats

GitHub-Stats-Light Top-Langs-Light

GitHub-Stats-Dark Top-Langs-Dark

DISCLAIMER

All the tools associated with this GitHub account are provided for educational and research purposes only. The owner of the account is not responsible for any illegal use of any of the related tooling.

Pinned Loading

  1. usbrip usbrip Public archive

    Tracking history of USB events on GNU/Linux

    Python 1.2k 112

  2. WeaponizeKali.sh WeaponizeKali.sh Public

    Collection of extra pentest tools for Kali Linux

    Shell 109 23

  3. DivideAndScan DivideAndScan Public

    Divide full port scan results and use it for targeted Nmap runs

    Python 327 50

  4. PPN PPN Public

    Pentester's Promiscuous Notebook

    504 116