Pinned Repositories
ackack
A program to monitor network traffic and detect unauthorized sessions.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
ADAPE-Script
Active Directory Assessment and Privilege Escalation Script
ADAudit
Windows PowerShell module to help in the auditing of Active Directory environments.
Amass
In-depth Attack Surface Mapping and Asset Discovery
getsploit
Command line utility for searching and downloading exploits
go-exploitdb
Tool for searching Exploits from Exploit Databases, etc.
nmap-vulners
NSE script based on Vulners.com API
OSCP
OSCP Study Guide
Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
cjoan75's Repositories
cjoan75/Checklists
Red Teaming & Pentesting checklists for various engagements
cjoan75/rpi-fruitbox
Raspberry Pi fruitbox
cjoan75/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
cjoan75/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
cjoan75/cset
Cybersecurity Evaluation Tool
cjoan75/Sparrow
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
cjoan75/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
cjoan75/CrackMapExec
A swiss army knife for pentesting networks
cjoan75/spiderfoot
SpiderFoot automates OSINT collection so that you can focus on analysis.
cjoan75/HELK
The Hunting ELK
cjoan75/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
cjoan75/Rubeus
Trying to tame the three-headed dog.
cjoan75/ikeforce
cjoan75/red_team_tool_countermeasures
cjoan75/mimikatz
A little tool to play with Windows security
cjoan75/scripts
Various scripts for penetration testing
cjoan75/thc-tips-tricks-hacks-cheat-sheet
Various tips & tricks
cjoan75/KeeThief
Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.
cjoan75/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
cjoan75/sigma
Generic Signature Format for SIEM Systems
cjoan75/Mythic
A collaborative, multi-platform, red teaming framework
cjoan75/caldera
Scalable Automated Adversary Emulation Platform
cjoan75/Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
cjoan75/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
cjoan75/mordor
Re-play Adversarial Techniques
cjoan75/VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
cjoan75/cascade-server
CASCADE Server
cjoan75/asn
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / ASPath / Organization / IP reputation lookup tool
cjoan75/DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
cjoan75/DeepBlueCLI