Pinned Repositories
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
arduino-esp32
Arduino core for the ESP32
awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
bashbunny-payloads
The Official Bash Bunny Payload Repository
linenoise
A small self-contained alternative to readline and libedit
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
r3
Automated Web Vulnerability Scanner
rogue-jndi
A malicious LDAP server for JNDI injection attacks
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Ryan-Cummings's Repositories
Ryan-Cummings/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Ryan-Cummings/arduino-esp32
Arduino core for the ESP32
Ryan-Cummings/bashbunny-payloads
The Official Bash Bunny Payload Repository
Ryan-Cummings/CVEs
A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.
Ryan-Cummings/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Ryan-Cummings/hashcat
World's fastest and most advanced password recovery utility
Ryan-Cummings/hashcat-legacy
Advanced CPU-based password recovery utility
Ryan-Cummings/hashcat-utils
Small utilities that are useful in advanced password cracking
Ryan-Cummings/logging-log4j1
Apache log4j1
Ryan-Cummings/OSINTsources
This is a repo containing several osint sources
Ryan-Cummings/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Ryan-Cummings/pineapple-modules
The Official WiFi Pineapple Module Repository for the WiFi Pineapple Mark 7
Ryan-Cummings/reverse-shell-generator
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Ryan-Cummings/Ryan-Cummings
Config files for my GitHub profile.
Ryan-Cummings/ScoutSuite
Multi-Cloud Security Auditing Tool
Ryan-Cummings/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Ryan-Cummings/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Ryan-Cummings/stumpless
a C logging library built for high performance and a rich feature set
Ryan-Cummings/terraform
Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
Ryan-Cummings/usbrubberducky-payloads
The Official USB Rubber Ducky Payload Repository
Ryan-Cummings/velociraptor
Digging Deeper....
Ryan-Cummings/Villain
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
Ryan-Cummings/yara
The pattern matching swiss knife
Ryan-Cummings/GOAD
game of active directory
Ryan-Cummings/JavaCoffeeShop
SNYK_App
Ryan-Cummings/puter
🌐 The Internet OS! Free, Open-Source, and Self-Hostable!
Ryan-Cummings/security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Ryan-Cummings/Shiro1Extractor
Python utility for extracting Apache Shiro 1 hashes from OrientDB files
Ryan-Cummings/sigma
Main Sigma Rule Repository
Ryan-Cummings/xzbot
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)