张德帅's repositories
Hacking-with-Go
Golang for Security Professionals
AD-control-paths
Active Directory Control Paths auditing and graphing tools
Chimay-Red
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
Cl0neMast3r
Git all your favorite tools in one click
CVE-2018-7600
Exploit for CVE-2018-7600 Drupal SA-CORE-2018-002. PoC (Proof-of-Concept).
DAMP
The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification
drupwn
Drupal enumeration tool
FakeDns
A regular-expression based python MITM DNS server with support for DNS Rebinding attacks
fetch-some-proxies
Simple Python script for fetching "some" (usable) proxies
firepwd
firepwd.py, an open source tool to decrypt Mozilla protected passwords
Internal-Monologue
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Invoke-BSOD
For when you want a computer to be done - without admin!
Invoke-CommandAs
Invoke Command using ScheduledJob with Credential on remote computer.
JShielder
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer
machine_learning_security
Source code about machine learning and security.
mitm6
pwning IPv4 via IPv6
monkey
Infection Monkey - An automated pentest tool
msf-autopwn
Autoexploitation of some of the most common vulnerabilities in wild
nemesis
A command-line network packet crafting and injection utility
Sanitiz3r
A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status
Sources
codes sources divers
tactical-exploitation
Modern tactical exploitation toolkit.
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.