Leon0pteryx's Stars
immich-app/immich
High performance self-hosted photo and video management solution.
LSPosed/MagiskOnWSALocal
Integrate Magisk root and Google Apps into WSA (Windows Subsystem for Android)
daffainfo/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
xpipe-io/xpipe
Your entire server infrastructure at your fingertips
fullhunt/log4j-scan
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
codingo/NoSQLMap
Automated NoSQL database enumeration and web application exploitation tool.
netero1010/EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
protectai/ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
Xacone/BestEdrOfTheMarket
Little user-mode AV/EDR evasion lab for training & learning purposes
lkarlslund/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
securityjoes/MasterParser
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
Decurity/semgrep-smart-contracts
Semgrep rules for smart contracts based on DeFi exploits
cristianzsh/forensictools
Collection of forensic tools
jackullrich/ShellcodeStdio
An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.
dobin/avred
Analyse your malware to surgically obfuscate it
MaorSabag/TrueSightKiller
CPP AV/EDR Killer
microsoft/ics-forensics-tools
Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project files.
Drew-Sec/EvilSlackbot
A Slack bot phishing framework for Red Teaming exercises
t3l3machus/BabelStrike
The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written in multiple (non-English) languages, common problem occurring from scraped employee name lists (e.g. from Linkedin). 2. to transliterate a wordlist that may include words/phrases written in multiple (non-Englis
byt3bl33d3r/dnschef-ng
DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts
ELMERIKH/Keres
Persistent Powershell backdoor tool {😈}
WGU-CCDC/Blue-Team-Tools
A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-Team defense under an active threat.
HalilDeniz/NetworkAssessment
NetworkAssessment: Network Compromise Assessment Tool
defparam/haptyc
danti1988/adcshunter
Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.
gustanini/PowerTools
Powershell tools used for Red Team / Pentesting.
pygrum/monarch
Monarch - The Adversary Emulation Toolkit
HalilDeniz/PassBreaker
PassBreaker
hacktivesec/beginner-kernel-exploitation-setup
sensepost/dresscode