Pinned Repositories
AhMyth
Cross-Platform Android Remote Administration Tool | Powered by electron W/ added JDK 11 support | A revival of the original repository at https://GitHub.com/AhMyth/AhMyth-Android-RAT
AORT
All in One Recon Tool for Bug Bounty
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
blackbuntu
Official repository of the Blackbuntu pentesting distribution
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
LinuxCheatSheet
Linux Cheat Sheet
lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
OnlyRAT
OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once installed we will have remote administrative access to our target that we can connect to through Python console on our attacker pc. The onlyrat console has plenty of payloads we can then use on our target.
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Drunk3nWarl0ck's Repositories
Drunk3nWarl0ck/blackbuntu
Official repository of the Blackbuntu pentesting distribution
Drunk3nWarl0ck/Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
Drunk3nWarl0ck/LinuxCheatSheet
Linux Cheat Sheet
Drunk3nWarl0ck/lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Drunk3nWarl0ck/OnlyRAT
OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once installed we will have remote administrative access to our target that we can connect to through Python console on our attacker pc. The onlyrat console has plenty of payloads we can then use on our target.
Drunk3nWarl0ck/Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Drunk3nWarl0ck/AhMyth
Cross-Platform Android Remote Administration Tool | Powered by electron W/ added JDK 11 support | A revival of the original repository at https://GitHub.com/AhMyth/AhMyth-Android-RAT
Drunk3nWarl0ck/AORT
All in One Recon Tool for Bug Bounty
Drunk3nWarl0ck/AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Drunk3nWarl0ck/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Drunk3nWarl0ck/BruteSploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Drunk3nWarl0ck/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Drunk3nWarl0ck/Complete-Python-3-Bootcamp
Course Files for Complete Python 3 Bootcamp Course on Udemy
Drunk3nWarl0ck/HardwareAllTheThings
Hardware/IOT Pentesting Wiki
Drunk3nWarl0ck/hoaxshell
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Drunk3nWarl0ck/mosint
An automated e-mail OSINT tool
Drunk3nWarl0ck/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Drunk3nWarl0ck/psudohash
Password list generator that focuses on keywords mutated by commonly used password creation patterns
Drunk3nWarl0ck/SSRFmap
Automatic SSRF fuzzer and exploitation tool
Drunk3nWarl0ck/TheFatRat
N/A
Drunk3nWarl0ck/Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell