Dvir S.'s repositories
RAT-via-Telegram
Windows Remote Post Breach Tool via Telegram
ShodanSearcher
Small python script that uses the Shodan API in order to search for servers.
Invoke-PSImage
Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
Winpayloads
Undetectable Windows Payload Generation
apt2
automated penetration toolkit
bashbunny-payloads
Payloads for the Hak5 Bash Bunny
BlueBadge
BlueBadge design
Enigma
Multiplatform payload dropper
Exploits
Windows Exploits
gshark-framework
This framework can be perform web post exploitation, with this you can interact with multiple web backdoor and execute custom module, script.
hadoopcryptoledger
Hadoop Crypto Ledger - Analyzing CryptoLedgers, such as Bitcoin Blockchain, on Big Data platforms, such as Hadoop/Spark/Flink/Hive
Internal-Monologue
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
ir-rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
JShielder
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer
LazyS
PoC malware built by copy-paste
LFISuite
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
MS17-011
MS17-010
msfpayloadgenerator
Generates several metasploit payloads
NXcrypt
python backdoor framework
opensource_device_blocks_tophat
Device tree for Blocks Modular Smartwatch (Qualcomm)
opensource_kernel_blocks_tophat
Kernel Source for Blocks Modular Smartwatch (Qualcomm)
portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
ptf
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
puppetstrings
Hitch a free ride to Ring 0 on Windows
RiskySPN
Detect and abuse risky SPNs
samfirm-sourcecode
[C#] a request handler for kies servers, which enables you to download various-firmware files for your device, without the actual need for KIES program, using a mock of useragent and other methods... reverse-engineered for education purposes
SmoothCriminal
Detect sandbox by cursor movement speed
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
wreckuests
Wreckuests — yet another one hard-hitting tool to run DDoS atacks with HTTP-flood