Pinned Repositories
AD-AssessmentKit
Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam.
AD-Suit
Active Directory Penetration Testing Tool
AD_MinerAD
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
AdvPhishing
This is Advance Phishing Tool ! OTP PHISHING
ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
AI-Ransomware
Next Generation of AI-based Ransomware
AiCEF
Alienvault-OTX-Wazuh
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
meetgyn's Repositories
meetgyn/adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
meetgyn/awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
meetgyn/BlueToolkit
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
meetgyn/CVE-2024-37081
meetgyn/CVE2CAPEC
Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated daily.
meetgyn/DarkGPT
DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an artificial intelligence assistant that can be useful in your traditional OSINT processes.
meetgyn/EvilTwin-Airbase-ng
An Evil Twin attack involves creating a fake Wi-Fi access point that mimics a legitimate one. The goal is to trick users into connecting to the rogue access point, allowing attackers to intercept, manipulate, or monitor the victims' network traffic.
meetgyn/Havoc
The Havoc Framework
meetgyn/IMSI-catcher
This program show you IMSI numbers of cellphones around you.
meetgyn/loboguarana
meetgyn/mantis
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
meetgyn/morpheus_IOC_scanner
Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Indicators of Compromise with unmatched precision across diverse formats, redefining cybersecurity defense.
meetgyn/natlas
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
meetgyn/nomore403
Tool to bypass 403/40X response codes.
meetgyn/open-source-web-scanners
A list of open source web security scanners
meetgyn/OsintIA_Tools
OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial intelligence, providing detailed insights into cybersecurity, potential vulnerabilities, and best mitigation practices.
meetgyn/OsintSearchLeaksBot
Este é um bot que desenvolvi para um amigo
meetgyn/RansomLook
Yet another Ransomware gang tracker
meetgyn/ransomwatch
the transparent ransomware claim tracker 🥷🏼🧅🖥️
meetgyn/RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
meetgyn/secator
secator - the pentester's swiss knife
meetgyn/SecBridge
meetgyn/securityonion
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
meetgyn/shell_gpt
A command-line productivity tool powered by AI large language models like GPT-4, will help you accomplish your tasks faster and more efficiently.
meetgyn/TEx
Telegram Monitor
meetgyn/ThreatActors-TTPs
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
meetgyn/ThreatMapper
Open Source Cloud Native Application Protection Platform (CNAPP)
meetgyn/trufflehog
Find and verify secrets
meetgyn/Wazuh-Rules
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
meetgyn/whats-spoofing
Reply spoofer for WhatsApp messages.