Black Hat RustApplied offensive security with Rust - Early access - https://academy.kerkour.com/black-hat-rust?coupon=GITHUB
Stars: ✭ 331 (-33.93%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+16.37%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-78.64%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-92.42%)
PentmenuA bash script for recon and DOS attacks
Stars: ✭ 288 (-42.51%)
SharpUnhookerC# Based Universal API Unhooker
Stars: ✭ 255 (-49.1%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+730.74%)
inceptorTemplate-Driven AV/EDR Evasion Framework
Stars: ✭ 730 (+45.71%)
iosCoThings's iOS application. CoThings is a realtime counter for shared things.
Stars: ✭ 13 (-97.41%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (-74.65%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-41.12%)
GhostwriterThe SpecterOps project management and reporting engine
Stars: ✭ 394 (-21.36%)
InMemoryNETExploring in-memory execution of .NET
Stars: ✭ 55 (-89.02%)
Dref DNS Rebinding Exploitation Framework
Stars: ✭ 423 (-15.57%)
iBeacon-AndroidiBeacon scanner and simulator - Android application example
Stars: ✭ 28 (-94.41%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-94.21%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-86.03%)
PiBeaconLow-cost iBeacon using Raspberry Pi
Stars: ✭ 41 (-91.82%)
linklink is a command and control framework written in rust
Stars: ✭ 345 (-31.14%)
win-beaconManaged BT stack for Windows able to detect and act as an iBeacon.
Stars: ✭ 49 (-90.22%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-83.03%)
ParadoxiaratParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-21.16%)
Cobaltstrike ToolsetAggressor Script, Kits, Malleable C2 Profiles, External C2 and so on
Stars: ✭ 290 (-42.12%)
Dns Rebind ToolkitA front-end JavaScript toolkit for creating DNS rebinding attacks.
Stars: ✭ 435 (-13.17%)
LiquidSnakeLiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
Stars: ✭ 266 (-46.91%)
Slackor A Golang implant that uses Slack as a command and control server
Stars: ✭ 392 (-21.76%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-95.61%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-92.61%)
GeaconPractice Go programming and implement CobaltStrike's Beacon in Go
Stars: ✭ 460 (-8.18%)
flutter beaconAn hybrid iBeacon scanner and transmitter SDK for Flutter Android and iOS.
Stars: ✭ 92 (-81.64%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-82.83%)
rtlsdr-wsprdWSPR daemon for RTL receivers
Stars: ✭ 93 (-81.44%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-26.15%)
GuideChimpCreate interactive guided product tours in minutes with the most non-technical friendly, lightweight and extendable library.
Stars: ✭ 138 (-72.46%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-90.42%)
OctopusOctopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (-95.01%)
Deimosc2DeimosC2 is a Golang command and control framework for post-exploitation.
Stars: ✭ 423 (-15.57%)
ycsmThis is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).
Stars: ✭ 73 (-85.43%)
ja3transportImpersonating JA3 signatures
Stars: ✭ 200 (-60.08%)
Hunter(l)user hunter using WinAPI calls only
Stars: ✭ 359 (-28.34%)
RT-CyberShieldProtecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges
Stars: ✭ 34 (-93.21%)
QuasarRemote Administration Tool for Windows
Stars: ✭ 4,897 (+877.45%)
PacketwhisperPacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-19.16%)
WalrusAn Android app that lets you use your access control card cloning devices in the field.
Stars: ✭ 350 (-30.14%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-92.81%)