UlyssesKlaue's repositories
autojenkins
Streamline your Jenkins
APTSimulator
A toolset to make a system look as if it was the victim of an APT attack
aquatone
A Tool for Domain Flyovers
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
caldera
Automated Adversary Emulation
can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
domain-to-ip
Python script to get IPs from domain names
Empire
Empire is a PowerShell and Python post-exploitation agent.
Fenrir
Simple Bash IOC Scanner
grapX
grapX will iterate through the URLs and grep the endpoints with all possible extensions.
httprobe
Take a list of domains and probe for working HTTP and HTTPS servers
lazyrecon
This script is intended to automate your reconnaissance process in an organized fashion
learn365
This repo is about @harshbothra_ 365 days of learning Tweet & Mindmap collection
LinkFinder
A python script that finds endpoints in JavaScript files
Loki
Loki - Simple IOC and Incident Response Scanner
massdns
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
meg
Fetch many paths for many hosts - without killing the hosts
megplus
Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
mywebappscripts
A collection of all the lists, scripts and techniques I use while doing web application penetration tests.
OSWE
OSWE Preparation
OWASP-VWAD
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
PoC-in-GitHub
📡PoC auto collect from GitHub.
rand
Just some random things
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.