Pinned Repositories
metasploit-framework
Metasploit Framework
king-phisher
Phishing Campaign Toolkit
king-phisher-plugins
Plugins for the King Phisher open source phishing campaign toolkit.
BloodHound
Six Degrees of Domain Admin
darkarmour
Windows AV Evasion
DeeDee
Stealthy DDE Exploit Payload generator and injector for DOCX files
dnSpy
.NET assembly editor, decompiler, and debugger
raindance
Reconnaissance tool for Microsoft Office 365
rubbercraft
rubber ducky / malduino automated payload generator
True-Demon's Repositories
True-Demon/raindance
Reconnaissance tool for Microsoft Office 365
True-Demon/DeeDee
Stealthy DDE Exploit Payload generator and injector for DOCX files
True-Demon/rubbercraft
rubber ducky / malduino automated payload generator
True-Demon/darkarmour
Windows AV Evasion
True-Demon/BloodHound
Six Degrees of Domain Admin
True-Demon/drupwn
Drupal enumeration & exploitation tool
True-Demon/enumerid
Enumerate RIDs using pure Python
True-Demon/EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
True-Demon/Findsploit
Find exploits in local and online databases instantly
True-Demon/gitkali
The friendly, undescriminating, kali and pentesting tool installer for Linux
True-Demon/hashview
A web front-end for password cracking and analytics
True-Demon/king-phisher
Phishing Campaign Toolkit
True-Demon/king-phisher-plugins
Plugins for the King Phisher open source phishing campaign toolkit.
True-Demon/king-phisher-templates
Templates for the King Phisher open source phishing campaign toolkit.
True-Demon/lsassy
Extract credentials from lsass remotely
True-Demon/metasploit-framework
Metasploit Framework
True-Demon/nps_payload
This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources. Written by Larry Spohn (@Spoonman1091) Payload written by Ben Mauch (@Ben0xA) aka dirty_ben
True-Demon/pentest-book
True-Demon/PSRecon
:rocket: PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally.
True-Demon/python-libnessus
Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC, parse and diff scan results. It's wonderful.
True-Demon/ROADtools
The Azure AD exploration framework.
True-Demon/scrapedin
Generate potential email addresses from LinkedIn
True-Demon/shimit
A tool that implements the Golden SAML attack
True-Demon/smoke-zephyr
Python utility collection
True-Demon/smtp2go-python
Python library for interacting with the smtp2go API
True-Demon/TL-BOTS
A collection of source code for various botnets.
True-Demon/true-demon.github.io
True-Demon/Veil
Veil 3.1.X (Check version info in Veil at runtime)
True-Demon/whodom
A domain verification tool for red team engagements
True-Demon/wpscan
WPScan is a black box WordPress vulnerability scanner