Pinned Repositories
Aggressor_mail
beacon,aggressor-scripts,cna,cobalt-strike,email
BLUESPAWN
Windows based Active Defense Tool to empower Blue Teams
gitGraber
gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Graphical
Open-Source, Platform independent module that consumes data points as input and plots them on a 2D graph [Scatter / Bar / Line] on the PowerShell Console/Terminal
HastySeries
ObscurityLabs RedTeam C# Toolkit
IIS_backdoor
backdoor
NetTracer
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
windows_pentest_tools
My pentest tools used two years ago. Part1
WpscaN
Wordpress vulnerability Scanner
SuperDong0's Repositories
SuperDong0/BLUESPAWN
Windows based Active Defense Tool to empower Blue Teams
SuperDong0/gitGraber
gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
SuperDong0/Graphical
Open-Source, Platform independent module that consumes data points as input and plots them on a 2D graph [Scatter / Bar / Line] on the PowerShell Console/Terminal
SuperDong0/HastySeries
ObscurityLabs RedTeam C# Toolkit
SuperDong0/IIS_backdoor
backdoor
SuperDong0/NetTracer
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
SuperDong0/Angora
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
SuperDong0/C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
SuperDong0/CVE-2018-13379
CVE-2018-13379
SuperDong0/CVE-2018-13382
CVE-2018-13382
SuperDong0/CVE-2019-11510
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
SuperDong0/defcon27_csharp_workshop
Writing custom backdoor payloads with C# - Defcon 27
SuperDong0/domainhunter
Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
SuperDong0/dsiem
Security event correlation engine for ELK stack
SuperDong0/efibootguard
Simple UEFI boot loader with support for safely switching between current and updated partition sets
SuperDong0/Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download)
SuperDong0/HFish
扩展企业安全测试主动诱导型开源蜜罐框架系统
SuperDong0/KCon
KCon is a famous Hacker Con powered by Knownsec Team.
SuperDong0/MahApps.Metro
A framework that allows developers to cobble together a Metro or Modern UI for their own WPF applications with minimal effort.
SuperDong0/monkey
Infection Monkey - An automated pentest tool
SuperDong0/NetCoreServer
Ultra fast and low latency asynchronous socket server & client C# .NET Core library with support TCP, SSL, UDP protocols and 10K connections problem solution
SuperDong0/PcapXray
:snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
SuperDong0/ReconCobra
Ultimate Recon Software for Information Gathering
SuperDong0/RedTeam-BCS
BCS(北京网络安全大会)2019 红队行动会议重点内容
SuperDong0/Rubeus
Trying to tame the three-headed dog.
SuperDong0/ScoutSuite
Multi-Cloud Security Auditing Tool
SuperDong0/SharPersist
SuperDong0/sRDI
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
SuperDong0/UAC_bypass_windows_store
Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)
SuperDong0/Windows-Internals
My repository to upload drivers from different books and all the information related to windows internals.