Ferbie10's Stars
deeexcee-io/AI-Report-Assistant
Harness the Power of AI for all your reporting needs.
blackhatethicalhacking/XSSRocket
XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
screetsec/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
MatrixTM/MHDDoS
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
boku7/HOLLOW
EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode
blackhatethicalhacking/pegasus_spyware
decompiled pegasus_spyware
blackhatethicalhacking/Pentest-Tools
NYAN-x-CAT/AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
ambray/ProcessHollowing
Simple Process Hollowing in C#
plackyhacker/SandboxDefender
C# code to Sandbox Defender (and most probably other AV/EDRs).
BroadbentT/ROGUE-AGENT
A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phishing campaigns, extrapolate hidden data such as subdomains, security identifers, usernames and encrypted passwords; utilise pass the hash techniques, crack and auto import ntds.dit files, create on-demand golden and silver Kerberos tickets and... well, so much more...
nettitude/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
joshfaust/Simple-Loader
Windows Defender ShellCode Execution Bypass
wireless90/ProcessInjector.NET
Learning Process Injection and Hollowing techniques
t3hbb/NSGenCS
Extendable payload obfuscation and delivery framework
blaCCkHatHacEEkr/PENTESTING-BIBLE
articles
JarVices/MsfMania
Python AV Evasion Tools
3ct0s/fud-backdoor
Create a fully undetectable backdoor with simple steps.
PushpenderIndia/crypter
Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted evil code
hash3liZer/SillyRAT
A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️
stormshadow07/HackTheWorld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
swagkarna/Defeat-Defender-V1.2.0
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
trueserve/openUF
Ubiquiti UniFi device emulator for OpenWRT routers and access points
ncorbuk/Python-Ransomware
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
JSchwalb11/Runescape3_GE_Trader
OWASP/wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
hvqzao/report-ng
Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.
six2dez/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
0xdekster/ReconNote
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
reconmap/reconmap
Vulnerability assessment and penetration testing automation and reporting platform for teams.