Beaconator
A beacon generator using Cobalt Strike and PEzor.
https://github.com/capt-meelo/Beaconator
A beacon generator using Cobalt Strike and PEzor.
https://github.com/capt-meelo/Beaconator
GitHub
GitHub - capt-meelo/Beaconator: A beacon generator using Cobalt Strike and a variety of tools.
A beacon generator using Cobalt Strike and a variety of tools. - capt-meelo/Beaconator
Request smuggler
Http request smuggling vulnerability scanner
https://github.com/sh1yo/request_smuggler
HTTP Desync Attacks: Request Smuggling Reborn
https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
#request_smuggler
Http request smuggling vulnerability scanner
https://github.com/sh1yo/request_smuggler
HTTP Desync Attacks: Request Smuggling Reborn
https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
#request_smuggler
GitHub
GitHub - Sh1Yo/request_smuggler: Http request smuggling vulnerability scanner
Http request smuggling vulnerability scanner. Contribute to Sh1Yo/request_smuggler development by creating an account on GitHub.
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
https://github.com/MythicAgents/Medusa
#c2 #python #medusa
https://github.com/MythicAgents/Medusa
#c2 #python #medusa
GitHub
GitHub - MythicAgents/Medusa: Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic - MythicAgents/Medusa
ShellShockHunter
Scan via Shodan search engine then try figure out Vulnerable or not
https://github.com/MrCl0wnLab/ShellShockHunter
#ShellShockHunter
Scan via Shodan search engine then try figure out Vulnerable or not
https://github.com/MrCl0wnLab/ShellShockHunter
#ShellShockHunter
GitHub
GitHub - MrCl0wnLab/ShellShockHunter: It's a simple tool for test vulnerability shellshock
It's a simple tool for test vulnerability shellshock - MrCl0wnLab/ShellShockHunter
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
https://github.com/BullsEye0/ghost_eye
#Ghost_eye #informationGathering
https://github.com/BullsEye0/ghost_eye
#Ghost_eye #informationGathering
GitHub
GitHub - BullsEye0/ghost_eye: Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information…
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye ...
#Exegol is a fully featured and community-driven hacking environment
It can be used in pentest engagements, #bugbounty, #CTF, #HackTheBox, #OSCP lab & exam and so on. Exegol's original fate was to be a ready-to-hack docker in case of emergencies during engagements.
https://github.com/ShutdownRepo/Exegol
It can be used in pentest engagements, #bugbounty, #CTF, #HackTheBox, #OSCP lab & exam and so on. Exegol's original fate was to be a ready-to-hack docker in case of emergencies during engagements.
https://github.com/ShutdownRepo/Exegol
GitHub
GitHub - ThePorgs/Exegol: Fully featured and community-driven hacking environment
Fully featured and community-driven hacking environment - ThePorgs/Exegol
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
https://github.com/HuskyHacks/ShadowSteal
#LPE
https://github.com/HuskyHacks/ShadowSteal
#LPE
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
https://us-cert.cisa.gov/ics/Downloading-and-Installing-CSET
https://github.com/cisagov/cset
#ICS #CSET
https://github.com/cisagov/cset
#ICS #CSET
www.cisa.gov
Downloading and Installing CSET | CISA
The Cyber Security Evaluation Tool (CSET®) provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture. CSET is a desktop software tool that guides asset owners and operators through a step-by-step process…
Authentication testing framework
https://github.com/DigeeX/raider
https://github.com/DigeeX/raider
GitHub
GitHub - DigeeX/raider: DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider
DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider - GitHub - DigeeX/raider: DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider
We developed GRAT2 Command & Control (C2) project for learning purpose.
https://github.com/r3nhat/GRAT2
https://hakin9.org/grat2-command-and-control-c2-tool-written-in-python3-and-the-client-in-net-4-0/
#C2 #python
https://github.com/r3nhat/GRAT2
https://hakin9.org/grat2-command-and-control-c2-tool-written-in-python3-and-the-client-in-net-4-0/
#C2 #python
GitHub
GitHub - r3nhat/GRAT2: We developed GRAT2 Command & Control (C2) project for learning purpose.
We developed GRAT2 Command & Control (C2) project for learning purpose. - r3nhat/GRAT2
DNS Reset Checker
Tools to assess the DNS security of web applications
https://github.com/The-Login/DNS-Reset-Checker
#DNS #Email
Tools to assess the DNS security of web applications
https://github.com/The-Login/DNS-Reset-Checker
#DNS #Email
GitHub
GitHub - The-Login/DNS-Reset-Checker: Tools to assess the DNS security of web applications
Tools to assess the DNS security of web applications - The-Login/DNS-Reset-Checker
Recon Script in VB . In case Powershell is disabled
https://chaah.awankloud.my/recon-in-vb/
#Recon #VB #Powershell
https://chaah.awankloud.my/recon-in-vb/
#Recon #VB #Powershell
Chaah
Recon in VB
Hardening results
Top 30+ Most Popular Red Team Tools
لیست معروف ترین ابزارهای تست نفوذ ، Red team که مراحل
#Reconnaissance
#Weaponization
#Delivery
#Exploitation
#Privilege_escalation
#Lateral_movement
#C2
#Exfiltrate_and_complete
https://securitytrails.com/blog/red-team-tools
#redteam
#pentest_tools
لیست معروف ترین ابزارهای تست نفوذ ، Red team که مراحل
#Reconnaissance
#Weaponization
#Delivery
#Exploitation
#Privilege_escalation
#Lateral_movement
#C2
#Exfiltrate_and_complete
https://securitytrails.com/blog/red-team-tools
#redteam
#pentest_tools
Testimo is PowerShell module for running health checks for Active Directory (and later on any other server type) against a bunch of different tests
https://github.com/EvotecIT/Testimo
#powershell #activedirectory #Testimo
https://github.com/EvotecIT/Testimo
#powershell #activedirectory #Testimo
GitHub
GitHub - EvotecIT/Testimo: Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different…
Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different tests - EvotecIT/Testimo