Pinned Repositories
adPEAS
Powershell tool to automate Active Directory enumeration.
APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
bootkit-samples
Bootkit sample for firmware attack
byeintegrity-uac
Bypass UAC by hijacking a DLL located in the Native Image Cache
byte_stinker
A PoC PE dumper designed to pull (potentially malicious) extra binaries stored in programs.
firmware-security-training
Katana-1
A Python Tool For google Hacking
lsarelayx
NTLM relaying for Windows made easy
MalwareDefenceScanner
MalwareDefenceScanner
PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
jack51706's Repositories
jack51706/awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
jack51706/AD-Pentest-Script
Active Directory pentest scripts
jack51706/androrat
Remote Administration Tool for Android devices
jack51706/bearded
jack51706/ChromeFuzzer
fuzz
jack51706/corkami
Automatically exported from code.google.com/p/corkami
jack51706/ctf-tools
Some setup scripts for security research tools.
jack51706/CuckooSploit
An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.
jack51706/evolve
Web interface for the Volatility Memory Forensics Framework
jack51706/faraday
Collaborative Penetration Test IDE
jack51706/lynis
Lynis - Security auditing and hardening tool for Unix/Linux based systems
jack51706/maltrieve
A tool to retrieve malware directly from the source for security researchers.
jack51706/mana
Our mana toolkit for wifi rogue AP attacks and MitM - see hostapd-mana too
jack51706/nishang
Nishang - PowerShell for penetration testing and offensive security.
jack51706/Panoptic
Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and config files through path traversal vulnerabilities.
jack51706/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
jack51706/PowerTools
Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.
jack51706/RATDecoders
Python Decoders for Common Remote Access Trojans
jack51706/runfromreg
Run executables from the Windows registry
jack51706/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
jack51706/SPF
SpeedPhishing Framework
jack51706/spilp
Automatically exported from code.google.com/p/spilp
jack51706/TARDIS
Threat Analysis, Reconnaissance, and Data Intelligence System
jack51706/training
Training materials crafted and publicly provided by Red Naga members
jack51706/trochilus
A Fast & free Windows remote administration tool.
jack51706/tvc
The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).
jack51706/Veil-Evasion
Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions
jack51706/viper
Binary analysis framework
jack51706/web_lists
Lists for a web pentest
jack51706/ZCR-Shellcoder
ZeroDay Cyber Research - ZCR Shellcoder - z3r0d4y.com Shellcode Generator