Pinned Repositories
reconscan
Reconscan is a tool for pentesters and bug bounty hunters to recon
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
AWAE_PREP
OSWE Preparation
bbtoolswithterraform
Install recon tools with terraform in digital ocean droplets
ffuf
Fast web fuzzer written in Go
hackbar_javaversion
Hackbar Java Version
HELK
The Hunting ELK
homebrew-pentest
Homebrew Tap - Pen Test Tools
JavaVulnerableLab
Vulnerable Java based Web Application
LKWA
Lesser Known Web Attack Lab
weev3's Repositories
weev3/bbtoolswithterraform
Install recon tools with terraform in digital ocean droplets
weev3/ctf
weev3/LOL-Pwn
Free Course Materials for LOL-Pwn
weev3/altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
weev3/attack-arsenal
A collection of red team and adversary emulation resources developed and released by MITRE.
weev3/awesome-appsec
A curated list of resources for learning about application security
weev3/awesome-vehicle-security
🚗 A curated list of resources for learning about vehicle security and car hacking.
weev3/BeRoot
Privilege Escalation Project - Windows / Linux / Mac
weev3/burpdeveltraining
Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"
weev3/caldera
Automated Adversary Emulation
weev3/codeql-uboot
weev3/commonspeak
Content discovery wordlists generated using BigQuery
weev3/DeathStar
Automate getting Domain Admin using Empire
weev3/DVIA-v2
Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. This project is developed and maintained by @prateekg147. The vulnerabilities and solutions covered in this app are tested up to iOS 11. The current version is writen in Swift and has the following vulnerabilities.
weev3/EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
weev3/hacker-container
Container with all the list of useful tools/commands while hacking Kubernetes Clusters
weev3/impacket
Impacket is a collection of Python classes for working with network protocols.
weev3/kerberoast
weev3/kubernetes-goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster.
weev3/linux-exploitation-course
A Course on Intermediate Level Linux Exploitation
weev3/macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
weev3/metta
An information security preparedness tool to do adversarial simulation.
weev3/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
weev3/nullCommunity
Hands-on content for Humla/Puliya sessions at null community
weev3/oss-fuzz
OSS-Fuzz - continuous fuzzing of open source software.
weev3/reternal-quickstart
Repo containing docker-compose files and setup scripts without having to clone the individual reternal components
weev3/security-paper
(与本人兴趣强相关的)各种安全or计算机资料收集
weev3/smartcontract_sec_roadmap
My personal bookmarks to learn smart contract bugs
weev3/SysmonHunter
An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal
weev3/WindowsInternals
Windows Internals Book 7th edition Tools