Freakazoidile's repositories
Exploit_Dev
Exploits, Exploits, Exploits and more Exploits!
Open-Windows-Exec-Check
Takes known Windows credentials to determine which services on which hosts can be used for RCE. Current Checks: RDP, SMBexec, PSexec, Task Schedule (atexec), DCOM, WMI
MS15-011-Files
Repo that the MS15-011 exploit clones to get required files. Avoids having to download all files from exploit_dev.
Cheat_Sheets
Collection of my own Cheat Sheets - mostly for red team and pentesting
nmap-xml-to-csv
edit of materaj/nmap-parser-xml-to-csv
actions-workflow-samples
Help developers to easily get started with GitHub Action workflows to deploy to Azure
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
BurpSuiteLoggerPlusPlus
Burp Suite Logger++: Log activities of all the tools in Burp Suite
CobaltStrike-Toolset
Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on
ctf_challenges
Write-up / Record of CTF challenges
dotnetcore-webapp
dotnet new webapp
Infosec_Reference
An Information Security Reference That Doesn't Suck
Misc-Powershell-Scripts
Random Tools
pentest_compilation
Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios
The-Hackers-Sandbox-Missions
Custom Mission packs for The Hackers Sandbox - http://www.flyingmonkeyarmy.com/
TokenForcer
Brute force weak, seemingly random values often used in session tracking such as cookies that rely on known inputs such as usernames and timestamps concatenated together and encoded
checkpwnedlist
A copy of a copy of a script that takes a single email, or a file with multiple emails and checks the have i been pwned site.
Blacklist3r
project-blacklist3r
cloud-build-samples
Code snippets used in Cloud Build documentation
cors-anywhere
CORS Anywhere is a NodeJS reverse proxy which adds CORS headers to the proxied request.
infosec_playbook
InfoSec playbook for course DPI911 - Incidence Response.
lonelypotato
Modified version of RottenPotatoNG C++
Machine-Learning-and-Binary-Visualization-for-Classifying-Files-in-Network-Traffic
We propose a tool that extracts unencrypted network data from packet captures files and uses binary visualization techniques, namely: entropy, natural translation, and hilbert curve to create images from the data. Those images are then used as a training set for the machine learning process. We showcase the classifications of image and evaluate the accuracy of various models. We conclude with a summary of our findings.
password_cracking_rules
One rule to crack all passwords. or atleast we hope so.
RedTeamCSharpScripts
C# Script used for Red Team