Pinned Repositories
ADTimeline
Timeline of Active Directory changes with replication metadata
autorest
OpenAPI (f.k.a Swagger) Specification code generator. Supports C#, Go, Java, Node.js, TypeScript, Python, Ruby and PHP.
awesome-bloodhound
A curated list of awesome BloodhoundAD resources
Lantester
Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.
Linux-command-executer
SSL-based Linux Reverse-Shell
pentest_tools
bashpy shadow brute-force
PracticalMalwareAnalysis-Labs
Binaries for the book Practical Malware Analysis
Windows_Postex
Post-explotation Hacks
WINspect
Powershell-based Windows Security Auditing Toolbox
XMLSigner
Academic project implementing XML documents signing and signature verification
A-mIn3's Repositories
A-mIn3/Lantester
Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.
A-mIn3/ADTimeline
Timeline of Active Directory changes with replication metadata
A-mIn3/31-days-of-API-Security-Tips
This challenge is Inon Shkedy's 31 days API Security Tips.
A-mIn3/ADACLScanner
Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory
A-mIn3/attacking-and-auditing-docker-containers-and-kubernetes-clusters
Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters
A-mIn3/AZ-500-Azure-Security
A-mIn3/BloodHound.py
A Python based ingestor for BloodHound
A-mIn3/ccat
Cisco Config Analysis Tool
A-mIn3/checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
A-mIn3/cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
A-mIn3/defcon_27_windbg_workshop
DEFCON 27 workshop - Modern Debugging with WinDbg Preview
A-mIn3/fakelogonscreen
Fake Windows logon screen to steal passwords
A-mIn3/kubeaudit
kubeaudit helps you audit your Kubernetes clusters against common security controls
A-mIn3/LogonTracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
A-mIn3/lsassy
Extract credentials from lsass remotely
A-mIn3/MobileHackingCheatSheet
Basics on commands/tools/info on how to assess the security of mobile applications
A-mIn3/msg-extractor
Extracts emails and attachments saved in Microsoft Outlook's .msg files
A-mIn3/o365-attack-toolkit
A toolkit to attack Office365
A-mIn3/Office365
Office 365 Powershell scripts
A-mIn3/PowerZure
PowerShell script to interact with Azure
A-mIn3/PrivescCheck
Privilege Escalation Enumeration Script for Windows
A-mIn3/rdpy
Remote Desktop Protocol in Twisted Python
A-mIn3/RedELK
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
A-mIn3/RedTeamCSharpScripts
C# Script used for Red Team
A-mIn3/SauronEye
Search tool to find specific files containing specific words, i.e. files containing passwords..
A-mIn3/Seth
Perform a MitM attack and extract clear text credentials from RDP connections
A-mIn3/SharpRDP
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
A-mIn3/SMBLibrary
Free, Open Source, User-Mode SMB 1.0/CIFS, SMB 2.0, SMB 2.1 and SMB 3.0 server and client library
A-mIn3/Sparrow
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
A-mIn3/VBA-RunPE
A VBA implementation of the RunPE technique or how to bypass application whitelisting.