Pinned Repositories
44CALIBER
Password+Cookies and more stealer, with sending logs into your Discord channel
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
androrat-stealth
Stealthier Fork of AndroRat
APT_REPORT
Interesting apt report collection and some special ioc express
APTSimulator
A toolset to make a system look as if it was the victim of an APT attack
AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome-sec-s3
A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets
modesth2's Repositories
modesth2/44CALIBER
Password+Cookies and more stealer, with sending logs into your Discord channel
modesth2/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
modesth2/AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
modesth2/awesome-sec-s3
A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets
modesth2/bhg
Code samples for No Starch Press Black Hat Go
modesth2/byPass_AV
modesth2/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
modesth2/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
modesth2/COMahawk
Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
modesth2/CVE
CVE, reports, research
modesth2/cve-1
Gather and update all available and newest CVEs with their POC.
modesth2/Havoc
The Havoc Framework
modesth2/idahunt
idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro
modesth2/IIS-Raid
A native backdoor module for Microsoft IIS (Internet Information Services)
modesth2/ItroublveTSC
Official Source of ItroublveTSC, totally open source. No virus or anything. Feel free to have a look :)
modesth2/jenkins-attack-framework
modesth2/jmet
Java Message Exploitation Tool
modesth2/Kali-TX
Customized Kali Linux - Ansible playbook
modesth2/leela-zero
Go engine with no human-provided knowledge, modeled after the AlphaGo Zero paper.
modesth2/nuclei
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
modesth2/proxyshell
A basic proxylogon scanner
modesth2/pwn-stuff
Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.
modesth2/pwn_jenkins
Notes about attacking Jenkins servers
modesth2/pyrdp
RDP man-in-the-middle (mitm) and library for Python 3 with the ability to watch connections live or after the fact
modesth2/reFlutter
Flutter Reverse Engineering Framework
modesth2/roop
one-click deepfake (face swap)
modesth2/scanning
modesth2/Steam-Server-Manager
PowerShell Steam Server Manager
modesth2/StormKitty
:key: Stealer written on C#, logs will be sent to Telegram bot.
modesth2/tsunami-security-scanner
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.