Pinned Repositories
AD-AssessmentKit
Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam.
AD-Suit
Active Directory Penetration Testing Tool
AD_MinerAD
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
AdvPhishing
This is Advance Phishing Tool ! OTP PHISHING
ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
automated-threat-intelligent-model
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
AutoPWN-Suite
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
AvillaForensics
Avilla Forensics 3.0
badUSB-Targeting-Android
a proof of concept badUSB attack which install a apk on Android
meetgyn's Repositories
meetgyn/AD-AssessmentKit
Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam.
meetgyn/AD-Suit
Active Directory Penetration Testing Tool
meetgyn/AD_MinerAD
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
meetgyn/ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
meetgyn/cvemap
Navigate the CVE jungle with ease.
meetgyn/EMAGNET
Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute forcing spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
meetgyn/Face-Safety
Este é um programa Python que utiliza a biblioteca "face recognition" para detectar e reconhecer rostos em imagens capturadas pela câmera. Ele possui recursos para adicionar e excluir registros de pessoas, além de um modo scanner que exibe o nome da pessoa ao entrar na frente da câmera. É útil para fins de segurança e controle de acesso.
meetgyn/face_recognition
The world's simplest facial recognition api for Python and the command line
meetgyn/Files
Leaks for Students
meetgyn/GobyVuls
Vulnerabilities of Goby supported with exploitation.
meetgyn/HackerGPT
meetgyn/hackerone-reports
Top disclosed reports from HackerOne
meetgyn/m5stick-nemo
M5 Stick C firmware for high-tech pranks
meetgyn/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
meetgyn/nipejs
Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.
meetgyn/non-typical-OSINT-guide
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!
meetgyn/OneForAll
OneForAll
meetgyn/OTE-OSINT
OSINT Template Engine
meetgyn/PrestaXSRF
PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals vulnerabilities in PrestaShop E-Commerce
meetgyn/PrioritizedRiskRemediation
A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).
meetgyn/rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with mi
meetgyn/search.0t.rocks
meetgyn/sj
A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.
meetgyn/sqlmap
Automatic SQL injection and database takeover tool
meetgyn/static-binaries
Various *nix tools built as statically-linked binaries
meetgyn/Stinger
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator.
meetgyn/usbrubberducky-payloads
The Official USB Rubber Ducky Payload Repository
meetgyn/Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
meetgyn/webcopilot
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
meetgyn/xurlfind3rfork
A CLI utility to find domain's known URLs from curated passive online sources.