Pinned Repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
ADEssentials
PowerShell Active Directory helper functions to manage healthy Active Directory
AndroBugs_Framework
AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.
Android-exploit
Stagefright Android exploit
android-exploit-feed
android-exploit-feed
bettercap
A complete, modular, portable and easily extensible MITM framework.
beurk
BEURK Experimental Unix RootKit
pafishmacro
Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques implemented by malicious documents.
s-4-u-for-windows
s(4)u for Windows
WPScan
alessiodallapiazza's Repositories
alessiodallapiazza/bleah
A BLE scanner for "smart" devices hacking.
alessiodallapiazza/CVE
alessiodallapiazza/DNS-Data-Exfiltration
DNS Data Exfiltration
alessiodallapiazza/dostoevsky-pentest-notes
There may be inaccuracies as I'm still learning, mostly based on my interpretation thus far
alessiodallapiazza/DropboxC2C
DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
alessiodallapiazza/enumeration
Linux enumeration
alessiodallapiazza/hardentools
Hardentools is an utility that disables a number of risky Windows features.
alessiodallapiazza/Highcall-Library
alessiodallapiazza/IIS_exploit
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
alessiodallapiazza/Jadoube
alessiodallapiazza/kernelpop
kernel privilege escalation enumeration and exploitation framework
alessiodallapiazza/LaZagne
Credentials recovery project
alessiodallapiazza/modwifi
alessiodallapiazza/mythril
Security analysis tool for Ethereum smart contracts
alessiodallapiazza/OSCP-Survival-Guide
Kali Linux Offensive Security Certified Professional Survival Exam Guide
alessiodallapiazza/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
alessiodallapiazza/pe_recovery_tools
Helper tools for recovering dumped PE files
alessiodallapiazza/portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
alessiodallapiazza/PyExfil
A Python Package for Data Exfiltration
alessiodallapiazza/qark
Tool to look for several security related Android application vulnerabilities
alessiodallapiazza/radamsa
a general-purpose fuzzer
alessiodallapiazza/raven
raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.
alessiodallapiazza/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
alessiodallapiazza/redteam-plan
Issues to consider when planning a red team exercise.
alessiodallapiazza/RedTips
Red Team Tips as posted by @vysecurity on Twitter
alessiodallapiazza/reverse-engineering-reference-manual
Here is a collage of reverse engineering topics that I find interesting
alessiodallapiazza/ShimCacheParser
alessiodallapiazza/vm86
The x86 Script Instruction Virtual Machine
alessiodallapiazza/WHID
WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.
alessiodallapiazza/windows-operating-system-archaeology
windows-operating-system-archaeology @Enigma0x3 @subTee