Brandon-Russell-1's Stars
rgl/ovftool-binaries
VMware OVF Tool binaries archived for posterity
center-for-threat-informed-defense/adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
mitre-attack/attack-navigator
Web app that provides basic navigation and annotation of ATT&CK matrices
maddev-engenuity/AdversaryEmulation
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
microsoft/vscode
Visual Studio Code
MicrosoftDocs/power-automate-docs
microsoft/PowerPlatformConnectors
This is a repository for Microsoft Power Automate, Power Apps, and Azure Logic Apps connectors
PaulJerimy/SecCertRoadmapHTML
Security Certification Roadmap HTML5/CSS3 version
itaymigdal/Nimbo-C2
Nimbo-C2 is yet another (simple and lightweight) C2 framework
chvancooten/NimPlant
A light-weight first-stage C2 implant written in Nim.
besimorhino/powercat
netshell features all in version 2 powershell
Fahrj/reverse-ssh
Statically-linked ssh server with reverse shell functionality for CTFs and such
NotSoSecure/password_cracking_rules
One rule to crack all passwords. or atleast we hope so.
stealthsploit/OneRuleToRuleThemStill
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
TarlogicSecurity/kerbrute
An script to perform kerberos bruteforcing by using impacket
commixproject/commix
Automated All-in-One OS Command Injection Exploitation Tool.
initstring/evil-ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
albertony/vss
Volume Shadow Copy Service (VSS) utilities
hfiref0x/UACME
Defeating Windows User Account Control
rootm0s/WinPwnage
UAC bypass, Elevate, Persistence methods
antonioCoco/ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
calebstewart/pwncat
Fancy reverse and bind shell handler
61106960/adPEAS
Powershell tool to automate Active Directory enumeration.
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
rewardone/OSCPRepo
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
xsudoxx/OSCP
b4ny4n/CVE-2020-13151
POC for CVE-2020-13151
michenriksen/gitrob
Reconnaissance tool for GitHub organizations
trufflesecurity/trufflehog
Find and verify secrets
Arvanaghi/SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.