mattdep's Stars
BlackSnufkin/LitterBox
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
philosowaffle/peloton-to-garmin
Convert workout data from Peloton into JSON/TCX/FIT files and automatically upload to Garmin Connect
jstrosch/sclauncher
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.
malcomvetter/Periscope
Fully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation)
DragoQCC/HardHatC2
A C# Command & Control framework
natesubra/misc_scripts
Miscellaneous scripts
tomnomnom/anew
A tool for adding new lines to files, skipping duplicates
ned1313/Getting-Started-Terraform
Exercise files for my Pluralsight course
trickest/wordlists
Real-world infosec wordlists, updated regularly
packing-box/awesome-executable-packing
A curated list of awesome resources related to executable packing
riskydissonance/find-vulnerable-drivers
fr4nk3nst1ner/salarysleuth
Retrieves jobs based off criteria submitted and also returns median salary for software engineers for the hiring company.
ustayready/ShredHound
Small utility to chunk up a large BloodHound JSON file into smaller files for importing.
nstarke/cvely
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
itaymigdal/Nimbo-C2
Nimbo-C2 is yet another (simple and lightweight) C2 framework
naksyn/Pyramid
a tool to help operate in EDRs' blind spots
Tib3rius/AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Accenture/Spartacus
Spartacus DLL/COM Hijacking Toolkit
cisagov/RedEye
RedEye is a visual analytic tool supporting Red & Blue Team operations
wunderwuzzi23/gospray
Active Directory Password Spray Testing Utility in Go
blueteam0ps/memOptix
A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.
kyleavery/AceLdr
Cobalt Strike UDRL for memory scanner evasion.
nstarke/backdoored-grub2
Grub2 with backdoor modifications allowing the LUKS password to be sent over HTTP to a remote server when it is entered.
mgeeky/ProtectMyTooling
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
enkomio/AlanFramework
A C2 post-exploitation framework
Wh04m1001/DiagTrackEoP
boku7/BokuLoader
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
wikiZ/RedGuard
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
seanthegeek/yaramail
A Python package and command line utility for scanning emails with YARA rules