Adrian's repositories
Windows-Defender
Windows Defender Tweaks
AutoLocalPrivilegeEscalation
An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources.
awesome-pcaptools
A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
confsec
Security, hacking conferences (list)
free-for-dev
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
incapsula-logs-downloader
A Python script for downloading log files from Incapsula
inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
McAfee-MVISION-ePO-API
Script to pull logs from McAfee MVISION ePO
net-creds
Sniffs sensitive data from interface or pcap
openvpn
OpenVPN is an open source VPN daemon
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
phpbb-ext-telegramnotifications
Notify on Telegram whenever someone posts on phpBB
quiet
Transmit data with sound. Includes binaries for soundcards and .wav files.
radare2-regressions
Regression Tests for the Radare2 Reverse Engineer's Debugger
raven
raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.
rootkit
Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64
shic
SHell Irc Client
ShurBot_LinkedIn
El ShurBot que te permite aplicar a todas las ofertas con EasyApply en LinkedIn
telegram-history-dump
Backup Telegram chat logs using telegram-cli
tg-nearby
Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe
WindowsExploits
Windows exploits, mostly precompiled.
WPA2-HalfHandshake-Crack
This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.
zaproxy-website
The source of OWASP ZAP website
ZTRadio
Final project