Pinned Repositories
Empire
Empire is a PowerShell and Python post-exploitation agent.
hostapd-wpe
Modified hostapd to facilitate AP impersonation attacks
awae
dropengine
DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.
eaphammer
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
evil_twin
Python script for peforming basic Evil Twin attacks on open wifi networks. Written for my tutorial on the subject.
grey_harvest
Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate reliable proxies for use within Python applications.
sentrygun
Rogue AP killer
SharpFinder
silentbridge
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
s0lst1c3's Repositories
s0lst1c3/eaphammer
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
s0lst1c3/silentbridge
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
s0lst1c3/dropengine
DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.
s0lst1c3/sentrygun
Rogue AP killer
s0lst1c3/grey_harvest
Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate reliable proxies for use within Python applications.
s0lst1c3/SharpFinder
s0lst1c3/sentrygun-server
s0lst1c3/s0lst1c3.github.io
s0lst1c3/SharpShares
Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.
s0lst1c3/OffensiveCSharp
Collection of Offensive C# Tooling
s0lst1c3/osx_mic_record
Small command-line utility for recording audio using the builtin MacOS webcam mic.
s0lst1c3/Empire
Empire is a PowerShell and Python post-exploitation agent.
s0lst1c3/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
s0lst1c3/awae-ad-setup-scripts
s0lst1c3/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
s0lst1c3/owe-lab
s0lst1c3/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
s0lst1c3/txlab-ssh-callhome-scripts
s0lst1c3/alerting-detection-strategy-framework
A framework for developing alerting and detection strategies for incident response.
s0lst1c3/bifrost
Objective-C library and console to interact with Heimdal APIs for macOS Kerberos
s0lst1c3/hostap-owe
s0lst1c3/MimeSpray
MimeCast Password Spraying Tool
s0lst1c3/pywificontrol
Python API to control Wi-Fi connectivity
s0lst1c3/RawBytes
Simple mutable raw byte array written in C
s0lst1c3/audit-kernel
GitHub mirror of the Linux Kernel's audit repository
s0lst1c3/cobaltstrike-helper-scripts
s0lst1c3/cslogmanager
Python scripts for working with Cobalt Strike logs
s0lst1c3/dotfiles_desktop
Backup of my desktop configurations
s0lst1c3/lme
Logging Made Easy
s0lst1c3/readme-images