Pinned Repositories
161Check
This is a simple script written out of necessity to perform a quick and dirty check against devices on a network to determine if SNMP connections via default community string are successful
3klCon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
_scripts
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
AES-Killer
Burp plugin to decrypt AES Encrypted traffic of mobile apps
altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
Android-IMSI-Catcher-Detector
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
ClassRepo
Repository of Documents and Scripts for classes
EDRs
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
br3ign's Repositories
br3ign/ClassRepo
Repository of Documents and Scripts for classes
br3ign/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
br3ign/apple_bleee
Apple BLE research
br3ign/Arbitrium-RAT
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules
br3ign/awesome-industrial-control-system-security
A curated list of resources related to Industrial Control System (ICS) security.
br3ign/awesome-phishing
Collection of resources related to phishing
br3ign/caldera
Automated Adversary Emulation
br3ign/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the pentesters during an engagement / A valid dataset for the data scientist
br3ign/detection-rules
Rules for the Detection Engine in Elastic Security
br3ign/dnd-tldr
Dungeons and Dragons - Too Long; Didn't Read
br3ign/GHunt
🕵️♂️ Investigate Google Accounts with emails.
br3ign/GRAT2
We developed GRAT2 Command & Control (C2) project for learning purpose.
br3ign/Hash-Buster
Crack hashes in seconds.
br3ign/Karkinos
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
br3ign/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
br3ign/nerve
NERVE Continuous Vulnerability Scanner
br3ign/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
br3ign/pptxindex
Create a MS Word index file from PowerPoint notes and slides
br3ign/ProtOSINT
ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses
br3ign/proxmark3
Proxmark3 RDV4.0 based on iceman fork
br3ign/pwndrop
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
br3ign/RadareEye
A tool made for specially scanning nearby devices[BLE, Bluetooth & Wifi] and execute our given command on our system when the target device comes in-between range.
br3ign/Red-Team-Infrastructure
Tooling and commands for common red team and Infrastructure testing tasks
br3ign/RedTeamScripts
Repo with various Red Team scripts
br3ign/SharpSphere
.NET Project for Attacking vCenter
br3ign/sigma
Generic Signature Format for SIEM Systems
br3ign/Talks
All my slides for any talks
br3ign/Telemetry
ABUSING WINDOWS TELEMETRY FOR PERSISTENCE
br3ign/TIDoS-Framework
The Offensive Manual Web Application Penetration Testing Framework.
br3ign/usb-copier
USB drive copier example project for Raspberry Pi with the Adafruit 128x64 bonnet