danieldbg1's Stars
password123456/cve-collector
Simple Latest CVE Collector Written in Python
Flipper-XFW/Xtreme-Firmware
The Dom amongst the Flipper Zero Firmware. Give your Flipper the power and freedom it is really craving. Let it show you its true form. Dont delay, switch to the one and only true Master today!
romkatv/powerlevel10k
A Zsh theme
r1vs3c/auto-bspwm
Bash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.
v1s1t0r1sh3r3/airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
r4ulcl/wifi_db
Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting relations between APs, clients and it's Probes, WPS information and a global view of all the APs seen.
Raizo62/vwifi
Simulator of WiFi (802.11) interfaces to communicate between several Virtual Machines
padovah4ck/PSByPassCLM
Bypass for PowerShell Constrained Language Mode
davehardy20/sysinternals
The full SysInternals Suite
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
t3l3machus/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
jaykali/maskphish
Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
KuroLabs/stegcloak
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
TryCatchHCF/Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
nodauf/Girsh
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
D4Vinci/elpscrk
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
projectdiscovery/httpx
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
Sait-Nuri/CVE-2018-15473
OpenSSH 2.3 < 7.7 - Username Enumeration
OWASP/joomscan
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
wpscanteam/wpscan
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
andrew-d/static-binaries
Various *nix tools built as statically-linked binaries
3ndG4me/AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
ropnop/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
antonioCoco/ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
DominicBreuker/pspy
Monitor linux processes without root permissions
diego-treitos/linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
jpillora/chisel
A fast TCP/UDP tunnel over HTTP
WADComs/WADComs.github.io
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.