theotandoh
We identify, troubleshoot and resolve problems and issues in a faulty computer. REDFISH IA VEN is a broad field encompassing many tools, techniques
REDFISH IA VENGhana
theotandoh's Stars
ish-app/ish
Linux shell for iOS
hak5/usbrubberducky-payloads
The Official USB Rubber Ducky Payload Repository
t3l3machus/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
modoboa/modoboa
Mail hosting made simple
CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
p0dalirius/Awesome-RCE-techniques
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
koutto/pi-pwnbox-rogueap
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
chvancooten/maldev-for-dummies
A workshop about Malware Development
HaikuTeam/animator
Design tool for creating Lottie animations and interactive web components
iPower/KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor
tihanyin/PSSW100AVB
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
getezy/ezy
🔥 GUI client for gRPC/gRPC-Web
SNGWN/Burp-Suite
|| Activate Burp Suite Pro with Key-Generator and Key-Loader ||
antonioCoco/JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
NUL0x4C/AtomPePacker
A Highly capable Pe Packer
bytecode77/pe-union
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
BeichenDream/PrintNotifyPotato
PrintNotifyPotato
machine1337/fake-sms
A small and efficent script to send SMS all over the world anonymously
testanull/ProxyNotShell-PoC
jake-cryptic/AbsoluteDoubleTrace
A web extension to block browser fingerprinting (Manifest V2)
EnginDemirbilek/NorthStarC2
Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMalware #CnC #infosec #offensivesecurity #Trojan
oxfemale/PENTESTING-BIBLE
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
yan4ikyt/webhack
Hacking CCTV cameras
alfarom256/CVE-2022-3699
Lenovo Diagnostics Driver EoP - Arbitrary R/W
sensepost/dwn
d(ockerp)wn - a docker pwn tool manager
DJayalath/ImSter
Hide and view encrypted text inside images
Rvn0xsy/AsmShellcodeLoader
汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/
mgeeky/EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
ApatheticEuphoria/WPS-SLAUGHTER
This tool helps to automate the process of testing router WPS vulnerability to flood attacks using multiple* wireless adapters to see if it will reboot and UNLOCK.
bytecode77/bytecode77