Pinned Repositories
aggrokatz
Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon.
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
anomalia_check
security plugins for nagios to identify incident
deobfuscate
Python script to automatically deobfuscate malware code
LINUX_BACKDOOR
Teste com Backdoors basicas
maltran
A command line tool to download malware exercises from malware-traffic-analysis.net
Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
scripts-1
Various scripts for penetration testing
c4ri0c4's Repositories
c4ri0c4/apidetector
APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.
c4ri0c4/count-messages-for-whatsapp
Script em python que lê arquivos de conversas exportadas de Whatsapp e gera um gráfico em barra que mostra as pessoas que mais mandaram mensagens de forma decrescente.
c4ri0c4/CryptoTester
A utility for playing with cryptography, geared towards ransomware analysis.
c4ri0c4/digital-forensics-lab
Free hands-on digital forensics labs for students and faculty
c4ri0c4/DUMP_Memoria_exercicios1
Exercicios de Forense de Memoria
c4ri0c4/eCPPTv2-PTP-Notes
INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 Notes
c4ri0c4/eWPTv2-Notes
INE/eLearnSecurity Web Application Penetration Tester (eWPTv2) Notes
c4ri0c4/Frida-Labs
The repo contains a series of challenges for learning Frida for Android Exploitation.
c4ri0c4/GTFONow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
c4ri0c4/HedgehogLab
Malware Analysis Exercise Samples and Resources
c4ri0c4/insightvm-sql-queries
InsightVM helpful SQL queries
c4ri0c4/katomart
Repositório para realizar o Download de todas as plataformas conforme eu conseguir acesso
c4ri0c4/LFI-FINDER
LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities
c4ri0c4/m5stick-nemo
M5 Stick C firmware for high-tech pranks
c4ri0c4/NetworkNightmare
Network Pentesting Mindmap
c4ri0c4/OSCE3-Complete-Guide
OSWE, OSEP, OSED, OSEE
c4ri0c4/PetitPotato
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
c4ri0c4/python-for-OSINT-21-days
In this repository you will find sample code files for each day of the course "Python for OSINT. A 21-day course for beginners".
c4ri0c4/ransomware-samples
Warning! This repository contains samples of ransomware.
c4ri0c4/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
c4ri0c4/SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
c4ri0c4/sslcheck
A lazy python version to automate OpenSSL program tests. Just another program to check SSL cipher and protocols.
c4ri0c4/Teaching_LINUX_FORENSICS
A place in which I put various resources from my classes, presentations, and videos.
c4ri0c4/thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
c4ri0c4/uncover
Quickly discover exposed hosts on the internet using multiple search engines.
c4ri0c4/vuln-tf
c4ri0c4/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
c4ri0c4/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
c4ri0c4/Windows-Local-Privilege-Escalation-Cookbook
Windows Local Privilege Escalation Cookbook
c4ri0c4/WINDOWS_OFFENSIVE_SECURITY_AD_RedTeaming_CheatSheet
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.