noshitsecurity
Human. Cyborg. Maker. Mentor. Crushing the skills gap since 2020.
noshitsecurity.comAustin TX
noshitsecurity's Stars
BishopFox/unredacter
Never ever ever use pixelation as a redaction technique
jivoi/awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
elceef/dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
xtr4nge/FruityWifi
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
h3xduck/TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
samyk/skyjack
A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under your control.
x0rz/phishing_catcher
Phishing catcher using Certstream
saeidshirazi/awesome-android-security
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
harleyQu1nn/AggressorScripts
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
EgeBalci/sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
MichaelKoczwara/Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
lkarlslund/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
RickdeJager/stegseek
:zap: Worlds fastest steghide cracker, chewing through millions of passwords per second :zap:
mgeeky/RedWarden
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
jthuraisamy/TelemetrySourcerer
Enumerate and disable common sources of telemetry used by AV/EDR.
RoseSecurity/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus software when creating backdoors!
ch33r10/EnterprisePurpleTeaming
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
mrd0x/EvilSelenium
EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.
atlas0fd00m/rfcat
RfCat - swiss-army knife of ISM band radio
aaaddress1/Skrull
Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.
IvanGlinkin/AutoSUID
AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges.
xf97/JiuZhou
JiuZhou is a data set of Ethereum bug smart contracts (ICSME 2020).
cepxeo/dll4shell
Shellcode launcher for AV bypass
certtools/intelmq-feeds-documentation
Cyber Threat Intelligence Feeds
stafordtituss/HazProne
HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabling you to pentest Vulnerabilities within, and hence, gain a better understanding of what could go wrong and why!!
ACloudGuru-Resources/acg-project-azure-resume-starter
vanhoefm/mc-mitm
vanhoefm/libwifi-examples
noshitsecurity/shithub.github.io
NSS Jurassic Jungle® Project Codebase