NilangaPerera's Stars
An0nUD4Y/Evilginx-Phishing-Infra-Setup
Evilginx Phishing Engagement Infrastructure Setup Guide
ZSECURE/ZDEHASHED
Leo4j/Invoke-ADEnum
Automate Active Directory Enumeration
reveng007/Learning-EDR-and-EDR_Evasion
I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning path for me.
4ndr34z/shells
Script for generating revshells
evildaemond/physsec-methodology
A public, open source physical security methodology
m0rtem/CloudFail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
TheCyb3rAlpha/BobTheSmuggler
"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots).
Workingdaturah/Payload-Generator
An aggressor script that can help automate payload building in Cobalt Strike
S3cur3Th1sSh1t/Nim-RunPE
A Nim implementation of reflective PE-Loading from memory
S3cur3Th1sSh1t/NimGetSyscallStub
Get fresh Syscalls from a fresh ntdll.dll copy
lsecqt/OffensiveCpp
This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
l4rm4nd/LinkedInDumper
Python 3 script to dump/scrape/extract company employees from LinkedIn API
S3lrius/Nimalathatep
Nim Payload Generation
DERE-ad2001/Frida-Labs
The repo contains a series of challenges for learning Frida for Android Exploitation.
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
mytechnotalent/Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
hakluke/hakrevdns
Small, fast tool for performing reverse DNS lookups en masse.
Pennyw0rth/NetExec
The Network Execution Tool
rohsec/LEAKEY
LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services.
0x90n/InfoSec-Black-Friday
All the deals for InfoSec related software/tools this Black Friday
C3n7ral051nt4g3ncy/cURL_for_OSINT
cURL Tool Usage for OSINT (Open-Source Intelligence)
Enelg52/OffensiveGo
Golang weaponization for red teamers.
UnaPibaGeek/honeypots-detection
Nuclei templates for honeypots detection.
nemesida-waf/waf-bypass
Check your WAF before an attacker does
gotr00t0day/Gsec
Web Security Scanner
cpu0x00/SharpReflectivePEInjection
reflectively load and execute PEs locally and remotely bypassing EDR hooks
mertdas/SharpLateral
Lateral Movement
matro7sh/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
MrEmpy/Awesome-AV-EDR-XDR-Bypass
Awesome AV/EDR/XDR Bypass Tips