Pinned Repositories
161Check
This is a simple script written out of necessity to perform a quick and dirty check against devices on a network to determine if SNMP connections via default community string are successful
3klCon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
_scripts
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
AES-Killer
Burp plugin to decrypt AES Encrypted traffic of mobile apps
altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
Android-IMSI-Catcher-Detector
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
ClassRepo
Repository of Documents and Scripts for classes
EDRs
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
br3ign's Repositories
br3ign/AES-Killer
Burp plugin to decrypt AES Encrypted traffic of mobile apps
br3ign/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
br3ign/Bad-Pdf
Steal Net-NTLM Hashes using Bad-PDF
br3ign/certification-threat-intelligence
Study for threat intelligence certification
br3ign/diskusage
Basic Linux BASH shell script to display disk usage for mounted storage devices
br3ign/e013
WiFi password Stealer (for Microsoft Windows)
br3ign/Empire
Empire is a PowerShell and Python post-exploitation agent.
br3ign/firmwalker
Script for searching the extracted firmware file system for goodies!
br3ign/fluxion
Fluxion is a remake of linset by vk496 with less bugs and enhanced functionality.
br3ign/learn-python
📚 Playground and cheatsheet for learning Python
br3ign/Memcrashed-DDoS-Exploit
DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
br3ign/netdata
Get control of your servers. Simple. Effective. Awesome! https://my-netdata.io/
br3ign/OSCP-cheat-sheet
list of useful commands, shells and notes related to OSCP
br3ign/p0wnedShell
PowerShell Runspace Post Exploitation Toolkit
br3ign/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
br3ign/PHPMailer
The classic email sending library for PHP
br3ign/PRET
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
br3ign/pyrtlsdr
A Python wrapper for librtlsdr (a driver for Realtek RTL2832U based SDR's)
br3ign/RedHunt-OS
Virtual Machine for Adversary Emulation and Threat Hunting
br3ign/rfcat
RfCat - swiss-army knife of ISM band radio
br3ign/routersploit
Exploitation Framework for Embedded Devices
br3ign/SILENTTRINITY
An asynchronous post-exploitation agent powered by Python, IronPython, C# and .NET's DLR
br3ign/social_mapper
A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)
br3ign/Th3inspector
Th3Inspector 🕵️ best tool for Information Gathering 🔎
br3ign/ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
br3ign/ThreatHunting
Powershell collection designed to assist in Threat Hunting Windows systems.
br3ign/tinfoleak
The most complete open-source tool for Twitter intelligence analysis
br3ign/Tokenvator
A tool to elevate privilege with Windows Tokens
br3ign/trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
br3ign/warberry
WarBerryPi - Tactical Exploitation