CryptoHackz's starred repositories

awesome-flipperzero

🐬 A collection of awesome resources for the Flipper Zero device.

License:CC0-1.0Stargazers:18413Issues:641Issues:0

evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Language:GoLicense:BSD-3-ClauseStargazers:10707Issues:300Issues:877

arkime

Arkime is an open source, large scale, full packet capturing, indexing, and database system.

Language:JavaScriptLicense:Apache-2.0Stargazers:6286Issues:351Issues:1422

cuckoo

Cuckoo Sandbox is an automated dynamic malware analysis system

Language:JavaScriptLicense:NOASSERTIONStargazers:5535Issues:436Issues:2392

Advanced-SQL-Injection-Cheatsheet

A cheat sheet that contains advanced queries for SQL Injection of all types.

FreedomGPT

This codebase is for a React and Electron-based app that executes the FreedomGPT LLM locally (offline and private) on Mac and Windows using a chat-based interface

Language:TypeScriptLicense:GPL-3.0Stargazers:2597Issues:53Issues:97

evilgophish

evilginx3 + gophish

Language:GoLicense:MITStargazers:1616Issues:35Issues:6

Damn-Vulnerable-GraphQL-Application

Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.

Language:JavaScriptLicense:MITStargazers:1493Issues:27Issues:32

Awesome-CloudSec-Labs

Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.

Hunting-Queries-Detection-Rules

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Language:PythonLicense:BSD-3-ClauseStargazers:1175Issues:61Issues:5

PowerShell-Obfuscation-Bible

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.

License:MITStargazers:804Issues:15Issues:0

OffSec-Reporting

Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool

Awesome_Malware_Techniques

This is a repository of resource about Malware techniques

GC2-sheet

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.

Language:GoLicense:GPL-3.0Stargazers:527Issues:15Issues:12

LOOBins

Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.

Language:PythonLicense:GPL-3.0Stargazers:429Issues:11Issues:64

File-Smuggling

HTML smuggling is not an evil, it can be useful

Language:HTMLStargazers:376Issues:4Issues:0

Revenant

Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework

Language:CStargazers:367Issues:9Issues:0

monitor

The new Cuckoo Monitor.

Language:PHPLicense:GPL-3.0Stargazers:337Issues:47Issues:55

community

Repository of modules and signatures contributed by the community

ransomware_notes

An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz

Language:HTMLLicense:MITStargazers:271Issues:21Issues:2

Breach-Report-Collection

A collection of companies that disclose adversary TTPs after they have been breached

Image-Research-OSINT

Learn how to research images and the tools, techniques & tradecraft required.

stacs

Static Token And Credential Scanner

Language:PythonLicense:BSD-3-ClauseStargazers:94Issues:7Issues:10

MeliziaC2

DNS over HTTPS targeted malware (only runs once)

Language:PythonLicense:NOASSERTIONStargazers:89Issues:3Issues:1

Hades-C2

Hades Basic Command & Control Server

Language:PythonLicense:GPL-3.0Stargazers:85Issues:3Issues:0

hacking-cybersecurity

Hacking & Cybersecurity class materials - Scott J. Shapiro & Sean O'Brien

Language:HTMLLicense:AGPL-3.0Stargazers:83Issues:12Issues:0

BlueBox

BlueBox Malware analysis Box and Cyber threat intelligence.

Language:YARAStargazers:38Issues:5Issues:0

Malware-Threat-Reports

A full analysis report detailing as much as possible of a Malware or a Threat