yandek16's Stars
login-securite/DonPAPI
Dumping DPAPI credz remotely
helviojunior/hookchain
HookChain: A new perspective for Bypassing EDR Solutions
bpc-clone/bypass-paywalls-firefox-clean
mellow-hype/cve-2024-20017
exploits for CVE-2024-20017
sullo/nikto
Nikto web server scanner
James-Livesey/Sinecraft
A Minecraft clone that runs on Casio calculators!
aress31/wirespy
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Pennyw0rth/NetExec
The Network Execution Tool
bhassani/EternalBlueC
EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode & DLL uploader
3ndG4me/AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
MarcoG3/WhatsDump
Extract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
GyulyVGC/sniffnet
Comfortably monitor your Internet traffic 🕵️♂️
JohnHammond/recaptcha-phish
Phishing with a fake reCAPTCHA
BlackSnufkin/NyxInvoke
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support
chm0dx/creepyCrawler
OSINT tool to crawl a site and extract useful recon info.
rhasspy/piper
A fast, local neural text to speech system
tianocore/edk2
EDK II
ldpreload/BlackLotus
BlackLotus UEFI Windows Bootkit
dafthack/MFASweep
A tool for checking if MFA is enabled on multiple Microsoft Services
0x6rss/WhatsApp-extension-manipulation-PoC
Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is available in this repo
massgravel/Microsoft-Activation-Scripts
Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
SecDbg/Prince-Ransomware
Go ransomware utilising ChaCha20 and ECIES encryption.
S3N4T0R-0X0/APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
Offensive-Panda/ProcessInjectionTechniques
This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository of knowledge, offering in-depth exploration of various process injection techniques used by adversaries.
S3N4T0R-0X0/BEAR
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine.
GoSecure/pyrdp
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
DavideViolante/GTAV
Source code of C++ scripted modifications for GTA V
luijait/DarkGPT
DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an artificial intelligence assistant that can be useful in your traditional OSINT processes.
Meckazin/ChromeKatz
Dump cookies and credentials directly from Chrome/Edge process memory