RedTeamOne line PS scripts that may come handy during your network assesment
Stars: ✭ 56 (+211.11%)
AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (+0%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (+166.67%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+59538.89%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (+1572.22%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+182727.78%)
sslcontext-kickstart🔐 A lightweight high level library for configuring a http client or server based on SSLContext or other properties such as TrustManager, KeyManager or Trusted Certificates to communicate over SSL TLS for one way authentication or two way authentication provided by the SSLFactory. Support for Java, Scala and Kotlin based clients with examples. Av…
Stars: ✭ 295 (+1538.89%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+33400%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-22.22%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+88.89%)
AboutsecurityA list of payload and bypass lists for penetration testing and red team infrastructure build.
Stars: ✭ 166 (+822.22%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+338.89%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (+100%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+388.89%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (+161.11%)
window-ratThe purpose of this tool is to test the window10 defender protection and also other antivirus protection.
Stars: ✭ 59 (+227.78%)
BubblyBetter SSL in Nginx in 10 minutes. Configuration files and setup scripts for Certbot.
Stars: ✭ 217 (+1105.56%)
brutasWordlists and passwords handcrafted with ♥
Stars: ✭ 32 (+77.78%)
fofa viewer一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+4427.78%)
openssl caopenssl_ca with QT GUI
Stars: ✭ 16 (-11.11%)
red-tldr-dbRed TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation and try it out.
Stars: ✭ 33 (+83.33%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (+211.11%)
CTjsCTjs is a full set of classes necessary to work with any kind of Certificate Transparency log (V1 as from RFC6962, or V2 as from RFC6962-bis). In CTjs you could find all necessary validation/verification functions for all related data shipped with full-featured examples showning how to validate/verify. Also in scope of CTjs I made code showing e…
Stars: ✭ 2 (-88.89%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (+188.89%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (+283.33%)
PayloadsPayload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (+2238.89%)
Loki.RatLoki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Remote Access Tool.
Stars: ✭ 63 (+250%)
Coursera-CertificationsA repository to showcase my completed courses on the Coursera platform.
Stars: ✭ 20 (+11.11%)
frida-android-unpinningA Frida script to disable SSL certificate pinning in a target application
Stars: ✭ 186 (+933.33%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+316.67%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (+111.11%)
pkcs11-toolsA set of tools to manage objects on PKCS#11 crypotographic tokens. Compatible with any PKCS#11 library, including NSS.
Stars: ✭ 70 (+288.89%)
tridentautomated password spraying tool
Stars: ✭ 133 (+638.89%)
adduser-dllSimple DLL that add a user to the local Administrators group
Stars: ✭ 48 (+166.67%)
KnockOutlookA little tool to play with Outlook
Stars: ✭ 188 (+944.44%)
x509sakX.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting
Stars: ✭ 23 (+27.78%)
flow-stateUI state management with RxJS.
Stars: ✭ 33 (+83.33%)
rop-benchmarkROP Benchmark is a tool to compare ROP compilers
Stars: ✭ 23 (+27.78%)
MirrorDeploy Google and Wikipedia mirror with one command using now.sh.
Stars: ✭ 93 (+416.67%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (+488.89%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (+72.22%)
red-tldrred-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel with certain experience.
Stars: ✭ 159 (+783.33%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+1011.11%)
OffensiveCloudDistributionLeverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (+377.78%)
sns-sqs-big-payloadAmazon SNS/SQS client library that enables sending and receiving messages with payload larger than 256KiB via Amazon S3.
Stars: ✭ 40 (+122.22%)
qdigidocDEPRECATED DigiDoc3 Client is a program that can be used to sign digitally with ID-card and Mobile-ID, check the validity of digital signatures and open and save documents inside the signature container.
Stars: ✭ 25 (+38.89%)