SessiongopherSessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Stars: ✭ 833 (+430.57%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (-31.85%)
Aggressor scriptsA collection of useful scripts for Cobalt Strike
Stars: ✭ 126 (-19.75%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-64.33%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+418.47%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-84.08%)
Put2winScript to automate PUT HTTP method exploitation to get shell
Stars: ✭ 96 (-38.85%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-91.08%)
Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (+412.1%)
SecurityExplainedSecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Stars: ✭ 301 (+91.72%)
AutosintTool to automate common OSINT tasks
Stars: ✭ 150 (-4.46%)
PrivescA collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+400.64%)
YAPSYet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-77.71%)
Resource filesmosquito - Automating reconnaissance and brute force attacks
Stars: ✭ 95 (-39.49%)
LscriptThe LAZY script will make your life easier, and of course faster.
Stars: ✭ 3,056 (+1846.5%)
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+393.63%)
PidrilaPython Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-20.38%)
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+386.62%)
Cc.pyExtracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (+59.24%)
Flask UnsignCommand line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-42.68%)
Physmem2profitPhysmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Stars: ✭ 244 (+55.41%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (+380.25%)
Scout🔭 Lightweight URL fuzzer and spider: Discover a web server's undisclosed files, directories and VHOSTs
Stars: ✭ 241 (+53.5%)
Nimscan🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (-14.65%)
CommixAutomated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+1821.02%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+361.78%)
LeakscraperLeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Stars: ✭ 227 (+44.59%)
KatzkatzPython3 script to parse txt files containing Mimikatz output
Stars: ✭ 91 (-42.04%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1667.52%)
Linuxprivcheckerlinuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (+355.41%)
AndroticklerPenetration testing and auditing toolkit for Android apps.
Stars: ✭ 225 (+43.31%)
GtfoblookupOffline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io) and LOLBAS (https://github.com/LOLBAS-Project/LOLBAS)
Stars: ✭ 123 (-21.66%)
ShellabLinux and Windows shellcode enrichment utility
Stars: ✭ 225 (+43.31%)
Iot PtA Virtual environment for Pentesting IoT Devices
Stars: ✭ 218 (+38.85%)
AcamarA Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-43.31%)
Oscp Cheat SheetThis is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+37.58%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+331.21%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-8.28%)
LnkupGenerates malicious LNK file payloads for data exfiltration
Stars: ✭ 205 (+30.57%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+4515.29%)
O365reconretrieve information via O365 with a valid cred
Stars: ✭ 204 (+29.94%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+715.92%)
Doxboxweb-based OSINT and reconaissance toolkit
Stars: ✭ 202 (+28.66%)
Ssrf TestingSSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+994.27%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+305.1%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-0.64%)
JalescJust Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-3.18%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-14.01%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-17.2%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-31.21%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+5620.38%)
CitadelCollection of pentesting scripts
Stars: ✭ 333 (+112.1%)