chmosama's Stars
TH3xACE/EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
0xsp-SRD/mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
idnahacks/GoodHound
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
SubGlitch1/OSRipper
AV evading OSX Backdoor and Crypter Framework
Ch0pin/AVIator
Antivirus evasion project
stefan2200/aparoid
Static and dynamic Android application security analysis
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
WithSecureLabs/C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
CorentinJ/Real-Time-Voice-Cloning
Clone a voice in 5 seconds to generate arbitrary speech in real-time
Guezone/SECMON
SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.
nil0x42/phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
7h3w4lk3r/pyback
cross-platform C2 framework in python 2
we1h0/ElegyRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (Be Based On AsyncRAT)
joernchen/xxeserve
XXE Out of Band Server.
JarVices/MsfMania
Python AV Evasion Tools
KathanP19/HowToHunt
Collection of methodology and test case for various web vulnerabilities.
infosecn1nja/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
bin3xish477/cybersecurity
blue team, red team stuff. All things cyber ;)
mantvydasb/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
yeyintminthuhtut/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
ethicalhackingplayground/ssrf-king
SSRF plugin for burp Automates SSRF Detection in all of the Request
MobSF/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
M507/AWAE-Preparation
This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.
blacklanternsecurity/writehat
A pentest reporting tool written in Python. Free yourself from Microsoft Word.
avlidienbrunn/bountydash
BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.
ryan412/ADLabsReview
Active Directory Labs/exams Review
Ebryx/Nessus_Map
Parse .nessus file(s) and shows output in interactive UI
cyberstruggle/chalumeau
Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.
Zerx0r/Kage
Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
echo-devim/litewaf
Lightweight In-App Web Application Firewall for PHP