Pinned Repositories
Amass
In-depth Attack Surface Mapping and Asset Discovery
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome-hacker-search-engines
A list of search engines useful during Penetration testing, vulnerability assessments, red team operations, bug bounty and more
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
bhg
Code samples for No Starch Press Black Hat Go
blackhat-go
As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
CreepDetector
Heck off, creeps
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
cyberchef-recipes
A list of cyber-chef recipes and curated links
ihavenomouthan's Repositories
ihavenomouthan/Amass
In-depth Attack Surface Mapping and Asset Discovery
ihavenomouthan/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
ihavenomouthan/awesome-hacker-search-engines
A list of search engines useful during Penetration testing, vulnerability assessments, red team operations, bug bounty and more
ihavenomouthan/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
ihavenomouthan/bhg
Code samples for No Starch Press Black Hat Go
ihavenomouthan/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
ihavenomouthan/CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
ihavenomouthan/cyberchef-recipes
A list of cyber-chef recipes and curated links
ihavenomouthan/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
ihavenomouthan/DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
ihavenomouthan/Exploit-Challenges
A collection of vulnerable ARM binaries for practicing exploit development
ihavenomouthan/faker
Generate massive amounts of fake data in the browser and node.js
ihavenomouthan/Fast-Kubernetes
This repo covers Kubernetes Environment with LABs: Kubectl, Pod, Deployment, Service, PV, PVC, Kubeadm, Helm, etc.
ihavenomouthan/FruityWifi
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
ihavenomouthan/gopacket
Provides packet processing capabilities for Go
ihavenomouthan/gray_hat_csharp_code
This repository contains full code examples from the book Gray Hat C#
ihavenomouthan/Hack-Tools
The all-in-one Red Team extension for Web Pentester 🛠
ihavenomouthan/hermes
Swift 5 macOS agent
ihavenomouthan/inceptor
Template-Driven AV/EDR Evasion Framework
ihavenomouthan/infosec-resources
A list of helpful cybersecurity / infosec resources
ihavenomouthan/IntroLabs
Public labs from John Strand's classes.
ihavenomouthan/mdBook
Create book from markdown files. Like Gitbook but implemented in Rust
ihavenomouthan/metabigor
Intelligence tool but without API key
ihavenomouthan/offensive-azure
Collection of offensive tools targeting Microsoft Azure
ihavenomouthan/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ihavenomouthan/pimpmykali
Kali Linux Fixes for Newly Imported VM's
ihavenomouthan/pwst-resources
Resources for Students in the Practical Webapp Security and Testing course
ihavenomouthan/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
ihavenomouthan/security-testing-tools
A curated list of network penetration testing tools by GoVanguard.
ihavenomouthan/sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements