JrGoomer
01011010 01101101 01111000 01101000 01011010 00110011 01110100 01001100 01011010 01010111 01010110 01110111 01011000 00110000 01111000 01101100 01011001 0101100
Lisboa,Portugal
JrGoomer's Stars
fastfire/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
yarrick/iodine
Official git repo for iodine dns tunnel
Orange-Cyberdefense/ocd-mindmaps
Orange Cyberdefense mindmaps
cxnturi0n/convoC2
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
Mehdi0x90/Web_Hacking
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
daem0nc0re/TangledWinExec
PoCs and tools for investigation of Windows process execution techniques
coffinxp/loxs
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
netero1010/EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
wtsxDev/reverse-engineering
List of awesome reverse engineering resources
amlweems/xzbot
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
yeswehack/vulnerable-code-snippets
Twitter vulnerable snippets
mbechler/marshalsec
stuxnet999/MemLabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
newaetech/chipwhisperer-jupyter
Interactive ChipWhisperer tutorials using Jupyter notebooks.
decompiler-explorer/decompiler-explorer
Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
dessant/buster
Captcha solver extension for humans, available for Chrome, Edge and Firefox
OWASP/wrongsecrets
Vulnerable app with examples showing how to not use secrets
tid4l/GoWard
A robust Red Team proxy written in Go.
kubeshark/kubeshark
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes
blacklanternsecurity/TREVORproxy
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
opsdisk/the_cyber_plumbers_handbook
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
CoolerVoid/HiddenWall
Linux kernel module generator for Hidden firewall that follows the rules in the external YAML file.
codecrafters-io/build-your-own-x
Master programming by recreating your favorite technologies from scratch.
VirusTotal/yara
The pattern matching swiss knife
SigmaHQ/sigma
Main Sigma Rule Repository
ScarredMonk/SysmonSimulator
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
kasmtech/KasmVNC
Modern VNC Server and client, web based and secure
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
christophetd/log4shell-vulnerable-app
Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
NARKOZ/guides
Design and development guides