evmxattr's Stars
matro7sh/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
citronneur/pamspy
Credentials Dumper for Linux using eBPF
pathtofile/bad-bpf
A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29
salesforce/jarm
jakejarvis/awesome-shodan-queries
π A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»
Neo23x0/auditd
Best Practice Auditd Configuration
1N3/Sn1per
Attack Surface Management Platform
cdk-team/CDK
π¦ Make security testing of K8s, Docker, and Containerd easier.
infosecn1nja/Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
HashPals/Name-That-Hash
π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes with a neat web app π₯
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
elceef/dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
wireghoul/graudit
grep rough audit - source code auditing tool
s0md3v/Arjun
HTTP parameter discovery suite.
0xJs/CRTP-cheatsheet
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
0xJs/RedTeaming_CheatSheet
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
massgravel/Microsoft-Activation-Scripts
Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
dafthack/CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Orange-Cyberdefense/GOAD
game of active directory
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
LasCC/HackTools
The all-in-one browser extension for offensive security professionals π
SecWiki/windows-kernel-exploits
windows-kernel-exploits WindowsεΉ³ε°ζζζΌζ΄ιε
ShawnDEvans/smbmap
SMBMap is a handy SMB enumeration tool
skelsec/pypykatz
Mimikatz implementation in pure Python
gentilkiwi/mimikatz
A little tool to play with Windows security
nicocha30/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
0xsyr0/OSCP
OSCP Cheat Sheet
gitleaks/gitleaks
Find secrets with Gitleaks π
epinna/weevely3
Weaponized web shell
christophetd/CloudFlair
π Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.