Pinned Repositories
deepScanner
a tiny script to use nmap script scan on a previous nmap SYN (lighter) scans results
https-everywhere
The official Github mirror of the HTTPS Everywhere repository at https://gitweb.torproject.org/https-everywhere.git. You can send pull requests here.
interactive-tutorials
Interactive Tutorials
OSWindowsPrivEscalation
the Open Source Windows Privilege Escalation Guide
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
TwitterShortHandleFinder
It finds 'short' and available Twitter handles (usernames) to register with
Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
Hibr2Bin
Comae Hibernation File Decompressor
volatility
An advanced memory forensics framework
HackPi
Hacking tool inside a Raspberry Pi zero
AddaxSoft's Repositories
AddaxSoft/OSWindowsPrivEscalation
the Open Source Windows Privilege Escalation Guide
AddaxSoft/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
AddaxSoft/deepScanner
a tiny script to use nmap script scan on a previous nmap SYN (lighter) scans results
AddaxSoft/interactive-tutorials
Interactive Tutorials
AddaxSoft/snort-windows
a working configuration repository for snort under Windows
AddaxSoft/Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
AddaxSoft/abaddon
AddaxSoft/addrflipper
flips addr in bytes to use in exploits (little endian) eg: 41424344 => \x44\x43\x42\x41
AddaxSoft/apate
Your Friendly Neighbourhood Honeypot Maker and Manager
AddaxSoft/auto-overlay-remover
Chrome extension which removes overlays automatically from your chrome browser
AddaxSoft/awesome-sec-talks
A collected list of awesome security talks
AddaxSoft/black-magic
memory black magic tricks
AddaxSoft/dumps
AddaxSoft/exploitdb
The official Exploit Database repository
AddaxSoft/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
AddaxSoft/grav-skeleton-ceevee-site
Ceevee is a clean, modern, fully responsive site template for your resume and portfolio. With this template, you can easily introduce yourself and showcase your works to future clients and employers. Also, it is flexible and easy to customize so you even use this template as a creative, business or portfolio site for your company.
AddaxSoft/hackercon
List of Free Software and IT Security related conferences
AddaxSoft/hibr2bin
Comae Hibernation File Decompressor
AddaxSoft/immortalNC
keep nc (netcat) alive after disconnect when option -k is not supported (Debian)
AddaxSoft/jackit
JackIt - Exploit Code for Mousejack
AddaxSoft/Kyocera-FS1041
ppd file for FS1041
AddaxSoft/php-reverse-shell
make a php call home with netcat (i.e. a php reverse shell)
AddaxSoft/pth-sweeper
pass the hash for a list of ips
AddaxSoft/reddit-twitter-bot
Looks up posts from reddit and automatically posts them on Twitter.
AddaxSoft/Run-PE---Run-Portable-Executable-From-Memory
Code that allows running another windows PE in the same address space as the host process.
AddaxSoft/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
AddaxSoft/sectalks.github.io
SecTalks socially authored website
AddaxSoft/SharpShooter
Payload Generation Framework
AddaxSoft/ssh_key_sweeper
a tiny tool to use a dsa/rsa key on multiple hosts for the purpose of gaining access
AddaxSoft/volatility
An advanced memory forensics framework