Fresh's starred repositories
BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
House-of-Rust
The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.
NetworkNightmare
Network Pentesting Mindmap
ctf-writeups
Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).
search-libc
Web wrapper of niklasb/libc-database
lkm-rootkit
A LKM rootkit for most newer kernel versions.
Nugget-Invader
WiFi Attack + Recon Suite for the ESP8266 WiFi Nugget
HaxxDetector
A WiFi Nugget sketch to detect WiFi Haxx
Nugget-Packet-Monitor
Simple WiFi Packet Monitor for the ESP32S2 / ESP8266
Process-Injection-Techniques
Various Process Injection Techniques
flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
Limon
Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools
ghidra_scripts
Scripts for the Ghidra software reverse engineering suite.
awesome-ghidra
A curated list of awesome Ghidra materials
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Invoke-DNSteal
Simple & Customizable DNS Data Exfiltrator
Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!