Pinned Repositories
Active-Directory-Pentest-Notes
个人域渗透学习笔记
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
bitcoin-hacking-tools
The source code of main tools used in Bitcoin "non-malware-based" attacks.
breach-parse
A tool for parsing breached passwords
ceh-practical
CEH Practical Exam
Guide-CEH-Practical-Master
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Red-Team-Blue-Team-Field-Manual
security-challenge-answers
Answers to a security/hacking challenge to gauge competency
Windows-Privilege-Escalation-Resources
Compilation of Resources from TCM's Windows Priv Esc Udemy Course
aungthuaye's Repositories
aungthuaye/Amass
In-depth Attack Surface Mapping and Asset Discovery
aungthuaye/DeepBlueCLI
aungthuaye/virtuaplant
VirtuaPlant is a Industrial Control Systems simulator which adds a “similar to real-world control logic” to the basic “read/write tags” feature of most PLC simulators.
aungthuaye/metasploit-framework
Metasploit Framework
aungthuaye/teku
Java Implementation of the Ethereum 2.0 Beacon Chain
aungthuaye/ethereum-developer-tools-list
A guide to available tools and platforms for developing on Ethereum.
aungthuaye/DirSnipe
robots.txt go brrr
aungthuaye/smart-contract-best-practices
A guide to smart contract security best practices
aungthuaye/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
aungthuaye/mutillidae
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be updated on these platforms. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software. A containerized version of the application is available as a companion project.
aungthuaye/ghidra
Ghidra is a software reverse engineering (SRE) framework
aungthuaye/eternal_scanner
An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)
aungthuaye/bootstraps_flawed_logic
blog experiment on flawed bootstrap logic
aungthuaye/WxTCmd
aungthuaye/mona
Corelan Repository for mona.py
aungthuaye/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
aungthuaye/jadx
Dex to Java decompiler
aungthuaye/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
aungthuaye/Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
aungthuaye/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
aungthuaye/RedTeam_toolkit
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
aungthuaye/CEH-v11-Study-Guide
aungthuaye/badchars
Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.
aungthuaye/ShadowUser
影子用户 克隆
aungthuaye/marshalsec
aungthuaye/MBE
Course materials for Modern Binary Exploitation by RPISEC
aungthuaye/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
aungthuaye/InstagramOSINT
An Instagram Open Source Intelligence Tool
aungthuaye/ThreatHunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
aungthuaye/Practical-Ethical-Hacking-Resources
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course