Pinned Repositories
Acoustic-Attack
Acoustic Attack Sound Samples
av_evasion
catchmeifyoucan
Very Fast Ransomeware Simulator which encrypt files without getting detected by EDR
ChaiOS
EquationGroupLeaks
4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.
esxi-Realtek-RTL8125
Vmware ESXI 6.7 with latest CPU-Microcode and most of the Realtek NIC drivers
phison-2307-BadUSB
PS2251-07(PS2307) based BadUSB firmware
powershell
SMBLoris
zte-mc888-pro-mod
ZTE MC888 Pro Mod
bidhata's Repositories
bidhata/esxi-Realtek-RTL8125
Vmware ESXI 6.7 with latest CPU-Microcode and most of the Realtek NIC drivers
bidhata/phison-2307-BadUSB
PS2251-07(PS2307) based BadUSB firmware
bidhata/EquationGroupLeaks
4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.
bidhata/zte-mc888-pro-mod
ZTE MC888 Pro Mod
bidhata/catchmeifyoucan
Very Fast Ransomeware Simulator which encrypt files without getting detected by EDR
bidhata/powershell
bidhata/SMBLoris
bidhata/Acoustic-Attack
Acoustic Attack Sound Samples
bidhata/av_evasion
bidhata/ChaiOS
bidhata/evil_files
Evil Files Ready for testing
bidhata/fbstalker-526
Modified version of FBStalker for CPSC 526
bidhata/ghotalabot
https://t.me/sillycon
bidhata/LANs.py
Inject code, jam wifi, and spy on wifi users
bidhata/lunar
A UNIX security auditing tool based on several security frameworks
bidhata/maldissect
Malware Desecting Tools Dump
bidhata/Malware-Analysis-Training
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
bidhata/mix
bidhata/nipper-ng
Automatically exported from code.google.com/p/nipper-ng
bidhata/plugin.video.jiotv
bidhata/port-scan-automation
Automate NMAP Scans and Generate Custom Nessus Policies Automatically
bidhata/premantel
Premantel - A Malware analysis and Threat Intel Framework
bidhata/RedTeamTools
Few Test Tools
bidhata/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
bidhata/UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
bidhata/yarasilly2
Automatic generation of YARA rules from sample files.
bidhata/zealous-quack