0xCwrw
Recently graduated with a 1:1 in Cyber Security. Currently working in #BlueTeam and continuing my education via CompTIA, HTB and THM.
0xCwrw's Stars
skelsec/pypykatz
Mimikatz implementation in pure Python
netero1010/GhostTask
A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.
LuemmelSec/Custom-BloodHound-Queries
n8n-io/n8n
Free and source-available fair-code licensed workflow automation tool. Easily automate tasks across different services.
schollz/croc
Easily and securely send things from one computer to another :crocodile: :package:
coffeegist/bofhound
Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
boku7/azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
61106960/adPEAS
Powershell tool to automate Active Directory enumeration.
lucsemassa/github_cves_search
Find CVEs associated to Linux and public exploits on github
lkarlslund/Adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
0xsp-SRD/mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
frankwxu/digital-forensics-lab
Free hands-on digital forensics labs for students and faculty
cristianzsh/forensictools
Collection of forensic tools
TiiTcHY/ShoDomain-Seeker
ShoDomain Seeker is a Python script that leverages the Shodan API to discover subdomains associated with a given domain. This tool provides valuable insights into the infrastructure surrounding a domain, aiding in security assessments, penetration testing, and general domain reconnaissance.
lkarlslund/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
The-Viper-One/PsMapExec
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
mverschu/GrizzlyTunnel
GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.
cado-security/cloudgrep
cloudgrep is grep for cloud storage
p0dalirius/ExtractBitlockerKeys
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
mrwadams/attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
infosecn1nja/Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
A-poc/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
xpn/RandomTSScripts
Collection of random RedTeam scripts.
BC-SECURITY/Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
SpecterOps/at-ps
Adversary Tactics - PowerShell Training
Lissy93/web-check
🕵️♂️ All-in-one OSINT tool for analysing any website
lem0nSec/ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
ibraheemdev/modern-unix
A collection of modern/faster/saner alternatives to common unix commands.
OWASP/owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).