Pinned Repositories
AaronLocker
Robust and practical application whitelisting for Windows
Amass
In-depth Attack Surface Mapping and Asset Discovery
cicd-pipeline-train-schedule-dockerdeploy
Train Schedule sample app for Jenkins Pipelines CD with Docker exercises
cicd-pipeline-train-schedule-pipelines
Train Schedule sample app for Jenkins Pipelines exercises
Complete-Python-3-Bootcamp
Course Files for Complete Python 3 Bootcamp Course on Udemy
docker-ipsec-vpn-server
Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
Empire
Empire is a PowerShell and Python 3.x post-exploitation framework.
impacket
Impacket is a collection of Python classes for working with network protocols.
lsassy
Extract credentials from lsass remotely
OpenDoor
OWASP WEB Directory Scanner
erezhazan1's Repositories
erezhazan1/AaronLocker
Robust and practical application whitelisting for Windows
erezhazan1/Amass
In-depth Attack Surface Mapping and Asset Discovery
erezhazan1/cicd-pipeline-train-schedule-dockerdeploy
Train Schedule sample app for Jenkins Pipelines CD with Docker exercises
erezhazan1/cicd-pipeline-train-schedule-pipelines
Train Schedule sample app for Jenkins Pipelines exercises
erezhazan1/Complete-Python-3-Bootcamp
Course Files for Complete Python 3 Bootcamp Course on Udemy
erezhazan1/docker-ipsec-vpn-server
Docker image to run an IPsec VPN server, with IPsec/L2TP and Cisco IPsec
erezhazan1/Empire
Empire is a PowerShell and Python 3.x post-exploitation framework.
erezhazan1/impacket
Impacket is a collection of Python classes for working with network protocols.
erezhazan1/lsassy
Extract credentials from lsass remotely
erezhazan1/OpenDoor
OWASP WEB Directory Scanner
erezhazan1/OSCPRepo
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan (py2) in scripts folder. Py3 port coming. Custom ISO coming.
erezhazan1/snyk-iac-workshop
erezhazan1/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
erezhazan1/WindowsExploits
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.