TonyRode's Stars
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
BurntSushi/ripgrep
ripgrep recursively searches directories for a regex pattern while respecting your gitignore
jellyfin/jellyfin
The Free Software Media System
icsharpcode/ILSpy
.NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform!
gentilkiwi/mimikatz
A little tool to play with Windows security
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Tyrrrz/DiscordChatExporter
Exports Discord chat logs to a file
hfiref0x/UACME
Defeating Windows User Account Control
LasCC/HackTools
The all-in-one browser extension for offensive security professionals đź›
spacebarchat/spacebarchat
📬 Spacebar is a free open source selfhostable discord compatible communication platform
BC-SECURITY/Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
GhostPack/Rubeus
Trying to tame the three-headed dog.
fullhunt/log4j-scan
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
andrew-d/static-binaries
Various *nix tools built as statically-linked binaries
assetnote/kiterunner
Contextual Content Discovery Tool
EONRaider/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
dirkjanm/BloodHound.py
A Python based ingestor for BloodHound
cube0x0/CVE-2021-1675
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
topotam/PetitPotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
byt3bl33d3r/ItWasAllADream
A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
nsntrace/nsntrace
Perform network trace of a single process by using network namespaces.
ShutdownRepo/ShadowCoerce
MS-FSRVP coercion abuse PoC
adilsoybali/Log4j-RCE-Scanner
Remote command execution vulnerability scanner for Log4j.
L4ys/CVE-2022-21882
ThePorgs/Exegol-images
Docker images of the Exegol project
stanfrbd/searchcve
Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.
astar-security/Lestat
Check robustness of your (their) Active Directory accounts passwords
ThePorgs/Exegol-resources
Hacking resources for the Exegol project
AxelRoudaut/THC_BlueBorne
Projet long TLS-SEC pour la réalisation d'un challenge "tuto" lors de la Toulouse Hacking Convention. Exploitation de la faille Blueborne.