DnaSec's repositories
Thief-Cat
Powerfull fully undetect Tokens Grabber/Stealer send to webhook discord, Steal: Browsers Passwords/Cookies/CC, Window Info, Wallets, Minecraft, Bypass Firewall/Antivirus, Discord Injection, Chromium Injection JS (Brave,Chrome,OperaGX,Opera,Vivaldi,Edge,yandex).
pythoncode-tutorials
The Python Code Tutorials
evilgophish
evilginx3 + gophish
CrackMapExec
A swiss army knife for pentesting networks
PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
legion
Automatic Enumeration Tool based in Open Source tools
ethical-hacking-tools-python
Python programs & tools built in the Ethical Hacking with Python EBook
Process_Injection_Techniques
A collection of scripts that use process injection with varying complexity
lsassy
Extract credentials from lsass remotely
klezVirus.CyberSec.Blog
CyberSec Blog
Above
Network Vulnerability Scanner by Caster
ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
OSCP-Guided-Material
OSCP Cheat Sheet
Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
HellHall
Performing Indirect Clean Syscalls
Limelighter
A tool for generating fake code signing certificates or signing real ones
Go365
An Office365 User Attack Tool
LOLBAS---Living-off-the-Land-Binaries
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
ReconAIzer
A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomains and more!
awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Ivy
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
awesome-oscp
A curated list of awesome OSCP resources
yetAnotherObfuscator
C# obfuscator that bypass windows defender