1337g's repositories
AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
awesome-industrial-protocols
Security-oriented list of resources about industrial network protocols.
awesome-soc
A collection of sources of documentation, as well as field best practices, to build/run a SOC
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
CVE-2023-36664-Ghostscript-command-injection
Ghostscript command injection vulnerability PoC (CVE-2023-36664)
CVE-2024-21111
Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability
Darksteel
域内自动化信息搜集利用工具
DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
GodzillaPluge-codeExec
Godzilla插件|内存马|Suo5内存代理
grok-1
Grok open release
IPFuscator
IPFuscator - A tool to automatically generate alternative IP representations
Kerbeus-BOF
BOF for Kerberos abuse (an implementation of some important features of the Rubeus).
mhydeath
Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.
Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
nuclei
Fast and customizable vulnerability scanner based on simple YAML based DSL.
offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
opencti
Open Cyber Threat Intelligence Platform
Phishing.Database
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
roop
one-click deepfake (face swap)
SecDictionary
实战沉淀字典
SGK_Sites_and_Bots
免费在线社工库,免费Telegram社工库
Spartacus
Spartacus DLL/COM Hijacking Toolkit
TeamsPhisher
Send phishing messages and attachments to Microsoft Teams users
wails
Create beautiful applications using Go
Zeek-Intelligence-Feeds
Zeek-Formatted Threat Intelligence Feeds