moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+246.5%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-75.8%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-48.41%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-49.68%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-77.71%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-56.69%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+174.52%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+3685.35%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-52.23%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+181.53%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+372.61%)
Gitlab WatchmanMonitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-19.11%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-61.78%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+1.27%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+217.83%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+177.07%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+464.33%)
WsmanagerWebshell Manager
Stars: ✭ 99 (-36.94%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+729.94%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+2266.24%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+70.7%)
linkedinscraperLinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and then create these employee names, titles and emails.
Stars: ✭ 22 (-85.99%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-38.22%)
CredsleakerCredsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Stars: ✭ 247 (+57.32%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-61.15%)
OverRideBinary Exploitation and Reverse-Engineering (from assembly into C)
Stars: ✭ 69 (-56.05%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (-53.5%)
toolkitThe essential toolkit for reversing, malware analysis, and cracking
Stars: ✭ 176 (+12.1%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-61.78%)
restincodeA memorial site for Hackers and Infosec people who have passed
Stars: ✭ 62 (-60.51%)
Jira-LensFast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+17.83%)
titanmThis repository contains the tools we used in our research on the Google Titan M chip
Stars: ✭ 149 (-5.1%)
jira scanA simple remote scanner for Atlassian Jira
Stars: ✭ 89 (-43.31%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-91.08%)
viraCreate and update your Jira issues while inside Vim!
Stars: ✭ 76 (-51.59%)
ticket-check-actionVerify that pull request titles start with a ticket ID
Stars: ✭ 29 (-81.53%)
posteeSimple message routing system that receives input messages through a webhook interface and can enforce actions using predefined outputs via integrations.
Stars: ✭ 160 (+1.91%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+166.24%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-78.98%)
standards-maintenanceThis repository houses the interactions, consultations and work management to support the maintenance of baselined components of the Consumer Data Right API Standards and Information Security profile.
Stars: ✭ 32 (-79.62%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-77.07%)
contextualContextual Bandits in R - simulation and evaluation of Multi-Armed Bandit Policies
Stars: ✭ 72 (-54.14%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-70.06%)
ticketutilPython ticketing utility for working with tickets in popular tools
Stars: ✭ 58 (-63.06%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-51.59%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-78.98%)
rustpadMulti-threaded Padding Oracle attacks against any service. Written in Rust.
Stars: ✭ 75 (-52.23%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+70.06%)
gosystractA lightweight CLI tool that finds system calls being called inside golang applications.
Stars: ✭ 29 (-81.53%)
jira.shJIRA Client for Bash Scripts
Stars: ✭ 15 (-90.45%)
jira-sprint-reportingReporting in a Google Sheet on a Sprint level using JIRA REST API
Stars: ✭ 25 (-84.08%)
exploitsSome of my public exploits
Stars: ✭ 50 (-68.15%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-81.53%)
react-obfuscateAn intelligent React component to obfuscate any contact link!
Stars: ✭ 87 (-44.59%)
jirayaJiraya - Simple Jira CLI
Stars: ✭ 14 (-91.08%)
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (-61.15%)