usama7628674's Stars
DataTalksClub/data-engineering-zoomcamp
Free Data Engineering course!
projectdiscovery/katana
A next-generation crawling and spidering framework.
t3l3machus/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
mrd0x/BITB
Browser In The Browser (BITB) Templates
lgandx/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
weak1337/Alcatraz
x64 binary obfuscator
Accenture/Spartacus
Spartacus DLL/COM Hijacking Toolkit
aress31/wirespy
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
memN0ps/eagle-rs
Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)
Tsuyoken/ImgBackdoor
Hide your payload into .jpg file
Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
itaymigdal/Nimbo-C2
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Bw3ll/sharem
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
im-hanzou/Arbitrium-RAT
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules
ly4k/PassTheChallenge
Recovering NTLM hashes from Credential Guard
MWR-CyberSec/PXEThief
PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager
4g3nt47/Striker
A Command and Control (C2)
sensepost/impersonate
A windows token impersonation tool
RedSiege/PersistAssist
Fully modular persistence framework
nettitude/ShellcodeMutator
nelfo/Milfuscator
x86 PE Mutator
RistBS/ContextMenuHijack
Execute a payload at each right click on a file/folder in the explorer menu for persistence
NUL0x4C/HellShell
transform your payload into ipv4/ipv6/mac arrays
lem0nSec/CreateRemoteThreadPlus
CreateRemoteThread: how to pass multiple parameters to the remote thread function without shellcode.
NVISOsecurity/Interceptor
Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space
alt3kx/wafaray
Enhance your malware detection with WAF + YARA (WAFARAY)
CoolerVoid/ninja_shell
Secure shell using port Knocking technique with AES256-GCM
Octoberfest7/Cohab_Processes
A small Aggressor script to help Red Teams identify foreign processes on a host machine
mgeeky/msi-shenanigans
Proof of Concept code and samples presenting emerging threat of MSI installer files.
ferreiraklet/icmp_reverse_shell