mutedmouse
Dabbler in all things! I think the best things come from tinkering with disparate processes until you have a functional automation system.
mutedmouse's Stars
louislam/uptime-kuma
A fancy self-hosted monitoring tool
Z4nzu/hackingtool
ALL IN ONE Hacking Tool For Hackers
gotify/server
A simple server for sending and receiving messages in real-time per WebSocket. (Includes a sleek web-ui)
microsoft/onefuzz
A self-hosted Fuzzing-As-A-Service platform
cipher387/Dorks-collections-list
List of Github repositories and articles with list of dorks for different search engines
microsoft/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
Yaxser/Backstab
A tool to kill antimalware protected processes
olafhartong/ThreatHunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
pimps/JNDI-Exploit-Kit
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
certsocietegenerale/fame
FAME Automates Malware Evaluation
eladshamir/Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
m417z/winbindex
An index of Windows binaries, including download links for executables such as exe, dll and sys files
montysecurity/C2-Tracker
Live Feed of C2 servers, tools, and botnets
xorrior/RemoteRecon
Remote Recon and Collection
hakivvi/CVE-2022-29464
WSO2 RCE (CVE-2022-29464) exploit and writeup.
vulnersCom/api
Vulners Python API wrapper
lucky-luk3/Grafiki
Threat Hunting tool about Sysmon and graphs
xuanxuan0/TiEtwAgent
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
PiotrDabkowski/pyjsparser
Fast JavaScript parser for Python.
target/halogen
Automatically create YARA rules from malicious documents.
outflanknl/TamperETW
PoC to demonstrate how CLR ETW events can be tampered.
splunk/melting-cobalt
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
boozallen/MOTIF
Vanshal/Bug-Hunting
The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.
Matthias1590/ConsoleDraw
A python module to update the console without flashing.
harelsegev/INDXRipper
Carve file metadata from NTFS index ($I30) attributes
blackbear/make-the-masks
Repository of design files for Make the Mask and remixes
IronNetCybersecurity/IronNetTR
Threat research and reporting from IronNet's Threat Research Teams
Malshare/MalEx
MalShare Exchange
ikpehlivan/CVE-2022-42889-PoC-1
Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.