Olajuwon Faleke's starred repositories
build-your-own-x
Master programming by recreating your favorite technologies from scratch.
gef-legacy
Legacy version of GEF running for GDB+Python2
gef-legacy
Legacy version of GEF running for GDB+Python2
linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
some-assembly-required
đź“– An approachable introduction to Assembly.
hackingthe.cloud
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
community_kit
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be challenging to locate. Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike. The Cobalt Strike team acts as the curator and provides this kit to showcase this fantastic work.
Stormspotter
Azure Red Team tool for graphing Azure and Azure Active Directory objects
Oh365UserFinder
Python3 o365 User Enumeration Tool
geeMailUserFinder
Python Gmail User Enumeration Tool
threader3000
Multi-threaded Python Port Scanner with Nmap Integration
printdigit
Printing digits in Assembly
fast-autocomplete
Fast Autocomplete: When Elastcsearch suggestions are not fast and flexible enough
PurplePanda
Identify privilege escalation paths within and across different clouds
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
steganographr
Hide text in plain sight using invisible zero-width characters
Python-Backdoor
This project is a cross-platform backdoor/reverse shell and post-exploitation tool written in Python3
CVE-2019-7609
exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts