Pinned Repositories
adPEAS
Powershell tool to automate Active Directory enumeration.
APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
bootkit-samples
Bootkit sample for firmware attack
byeintegrity-uac
Bypass UAC by hijacking a DLL located in the Native Image Cache
byte_stinker
A PoC PE dumper designed to pull (potentially malicious) extra binaries stored in programs.
firmware-security-training
Katana-1
A Python Tool For google Hacking
lsarelayx
NTLM relaying for Windows made easy
MalwareDefenceScanner
MalwareDefenceScanner
PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
jack51706's Repositories
jack51706/NamedPipePTH
Pass the Hash to a named pipe for token Impersonation
jack51706/MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
jack51706/BeaconHunter
Detect and respond to Cobalt Strike beacons using ETW.
jack51706/SharpNoPSExec
Get file less command execution for lateral movement.
jack51706/DripLoader
Evasive shellcode loader for bypassing event-based injection detection (PoC)
jack51706/RemotePotato0
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
jack51706/Invoke-SharpLoader
jack51706/gshark
Scan for sensitive information easily and effectively.
jack51706/SockFuzzer
jack51706/CertStealer
A .NET tool for exporting and importing certificates without touching disk.
jack51706/Atomic-Red-Team-Intelligence-C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
jack51706/Detection-of-Sensitive-Data-Exposure-in-Images
A Machine Learning Model that classifies the data in the images as Sensitive or Non-sensitive.
jack51706/Invoke-Stealth
Simple & Powerful PowerShell Script Obfuscator
jack51706/msldap
LDAP library for auditing MS AD
jack51706/Glass
Glass是一款针对资产列表的快速指纹识别工具,通过调用Fofa/ZoomEye/Shodan/360等api接口快速查询资产信息并识别重点资产的指纹,也可针对IP/IP段或资产列表进行快速的指纹识别。
jack51706/pyMalleableC2
Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
jack51706/DivideAndScan
Divide full port scan results and use it for targeted Nmap runs
jack51706/maigret
OSINT username checker. Collect a dossier on a person by username from a huge number of sites.
jack51706/wappalyzergo
A high performance go implementation of Wappalyzer Technology Detection Library
jack51706/3klCon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
jack51706/columbo
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.
jack51706/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
jack51706/s3-account-search
S3 Account Search
jack51706/Zircolite
A standalone SIGMA-based detection tool for EVTX.
jack51706/blue-pigeon
Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) server and a compromised host.
jack51706/kics
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
jack51706/IPED
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners.
jack51706/magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
jack51706/Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
jack51706/CheeseTools
Self-developed tools for Lateral Movement/Code Execution