Pinned Repositories
cryptfs-tpm2
Store and restore a persistent passphrase with TPM 2.0
IMSI-catcher
This program show you IMSI numbers of cellphones around you.
kvm-qemu-virtualization-guide
Guide to run VMs with KVM and QEMU
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
proxychains-windows
Windows and Cygwin port of proxychains, based on MinHook and DLL Injection
PyLora
Low-level Lora (SX127_) Python module for Linux (Raspberry Pi and others)
Reddit_PostandComment_Deleter
Deletes reddit posts or comments of the page, and only what is on the page
REVENANT
Volatile ELF payloads generator with Metasploit integrations for testing GNU/Linux ecosystems against low-level threats
rust_os_dev
Just following along
Signal-Android
A private messenger for Android.
BrandonFanti's Repositories
BrandonFanti/cryptfs-tpm2
Store and restore a persistent passphrase with TPM 2.0
BrandonFanti/IMSI-catcher
This program show you IMSI numbers of cellphones around you.
BrandonFanti/kvm-qemu-virtualization-guide
Guide to run VMs with KVM and QEMU
BrandonFanti/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
BrandonFanti/proxychains-windows
Windows and Cygwin port of proxychains, based on MinHook and DLL Injection
BrandonFanti/PyLora
Low-level Lora (SX127_) Python module for Linux (Raspberry Pi and others)
BrandonFanti/Reddit_PostandComment_Deleter
Deletes reddit posts or comments of the page, and only what is on the page
BrandonFanti/REVENANT
Volatile ELF payloads generator with Metasploit integrations for testing GNU/Linux ecosystems against low-level threats
BrandonFanti/rust_os_dev
Just following along
BrandonFanti/Signal-Android
A private messenger for Android.
BrandonFanti/CobaltStr4.4
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors". Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.
BrandonFanti/VLANPWN
VLAN attacks toolkit