Pinned Repositories
acitoolkit
A basic toolkit for accessing the Cisco APIC
MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
deceptiveidn
Use computer vision to determine if an IDN can be interpreted as something it's not
olaf
Office365 Log Analysis Framework
subbrute
A DNS meta-query spider that enumerates DNS records, and subdomains.
trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
VBad
VBA Obfuscation Tools combined with an MS office document generator
voyeur
VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerful scripting language) without dependencies (just .Net Framework 3.5 and Ofiice Excel if you want an useful and pretty report). The generated report is a perfect starting point for well-established forensic, incident response team, or security researchers who want to quickly analyze threats in Active Directory Services.
Microsploit
Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow
sift-bootstrap
SIFT Bootstrap Script
nullprobe's Repositories
nullprobe/deceptiveidn
Use computer vision to determine if an IDN can be interpreted as something it's not
nullprobe/olaf
Office365 Log Analysis Framework
nullprobe/subbrute
A DNS meta-query spider that enumerates DNS records, and subdomains.
nullprobe/trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
nullprobe/VBad
VBA Obfuscation Tools combined with an MS office document generator
nullprobe/voyeur
VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerful scripting language) without dependencies (just .Net Framework 3.5 and Ofiice Excel if you want an useful and pretty report). The generated report is a perfect starting point for well-established forensic, incident response team, or security researchers who want to quickly analyze threats in Active Directory Services.