Pinned Repositories
attacking-telecommunications
Repository of telecom penetration testing tools and simulation environments
AWSBurpCollaborator
Deploy a Private Burpsuite Collaborator using boto3 Python Library
Bug-Bounty-Toolz
BBT - Bug Bounty Tools
Bypass_CGNAT
Wireguard setup to bypass CGNAT with a VPS
dotfiles
Personal dotfiles
Sheridan-College-CTF-2021-Bluetooth-Workshop
Material for the workshop we're hosting at Sheridan College
VirusShare-Search
Downloads VirusShare hashes (https://virusshare.com/hashes.4n6) and searches them for specified MD5 hashes
x64-SLAE
Examination submission for the x64 SLAE
Decryptonite
Ransomware Detection and Mitigation Software
jss7-attack-simulator
SS7 Attack Simulator based on RestComm's jss7
AdamGreenhill's Repositories
AdamGreenhill/VirusShare-Search
Downloads VirusShare hashes (https://virusshare.com/hashes.4n6) and searches them for specified MD5 hashes
AdamGreenhill/Sheridan-College-CTF-2021-Bluetooth-Workshop
Material for the workshop we're hosting at Sheridan College
AdamGreenhill/Bypass_CGNAT
Wireguard setup to bypass CGNAT with a VPS
AdamGreenhill/dotfiles
Personal dotfiles
AdamGreenhill/x64-SLAE
Examination submission for the x64 SLAE
AdamGreenhill/attacking-telecommunications
Repository of telecom penetration testing tools and simulation environments
AdamGreenhill/AWSBurpCollaborator
Deploy a Private Burpsuite Collaborator using boto3 Python Library
AdamGreenhill/Bug-Bounty-Toolz
BBT - Bug Bounty Tools
AdamGreenhill/dictionaries
Misc dictionaries for directory/file enumeration, username enumeration, password dictionary/bruteforce attacks
AdamGreenhill/flipperzero-firmware
Flipper Zero firmware source code
AdamGreenhill/Hermes
Hermes is the swiss army knife of sending command line e-mails.
AdamGreenhill/jss7-attack-simulator
SS7 Attack Simulator based on RestComm's jss7
AdamGreenhill/lazyrecon
This script is intended to automate your reconnaissance process in an organized fashion
AdamGreenhill/lazyrecon-docker
Docker image for the lazy recon script
AdamGreenhill/OSCP-Survival-Guide
Kali Linux Offensive Security Certified Professional Survival Exam Guide
AdamGreenhill/Probable-Wordlists
Wordlists sorted by probability originally created for password generation and testing
AdamGreenhill/shadowbroker
The Shadow Brokers "Lost In Translation" leak
AdamGreenhill/srslte-docker-emulated
Minimal end-to-end LTE. Dockerized and emulated radio over shared memory.
AdamGreenhill/theGreatRecon
AdamGreenhill/truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
AdamGreenhill/webapp-wordlists
This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains a wordlist of all the files directories for this version.
AdamGreenhill/x86-SLAE
Examination submission for the x86 SLAE