Asaf Hecht's starred repositories

linux

Linux kernel source tree

Language:CLicense:NOASSERTIONStargazers:182431Issues:7778Issues:0

Awesome-Hacking

A collection of various awesome lists for hackers, pentesters and security researchers

License:CC0-1.0Stargazers:85467Issues:3861Issues:0

ghidra

Ghidra is a software reverse engineering (SRE) framework

Language:JavaLicense:Apache-2.0Stargazers:51754Issues:1035Issues:4960

esp8266_deauther

Affordable WiFi hacking platform for testing and learning

Language:CLicense:NOASSERTIONStargazers:13510Issues:634Issues:1003

Red-Teaming-Toolkit

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

my-arsenal-of-aws-security-tools

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Language:ShellLicense:Apache-2.0Stargazers:8973Issues:395Issues:33

ctf-tools

Some setup scripts for security research tools.

Language:ShellLicense:BSD-3-ClauseStargazers:8515Issues:293Issues:51

Awesome-Red-Teaming

List of Awesome Red Teaming Resources

KubiScan

A tool to scan Kubernetes cluster for risky permissions

Language:PythonLicense:GPL-3.0Stargazers:1323Issues:30Issues:32

kubesploit

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

Language:GoLicense:GPL-3.0Stargazers:1123Issues:29Issues:2

SkyArk

SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS

Language:PowerShellLicense:MITStargazers:872Issues:41Issues:15

ACLight

A script for advanced discovery of Privileged Accounts - includes Shadow Admins

Language:PowerShellLicense:BSD-3-ClauseStargazers:786Issues:72Issues:9

PipeViewer

A tool that shows detailed information about named pipes in Windows

Language:C#License:Apache-2.0Stargazers:567Issues:11Issues:1

zBang

zBang is a risk assessment tool that detects potential privileged account threats

Language:C#License:MITStargazers:336Issues:22Issues:8

BlobHunter

Find exposed data in Azure with this public blob scanner

Language:PythonLicense:MITStargazers:315Issues:26Issues:10

Evasor

A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies

Language:C#License:Apache-2.0Stargazers:309Issues:27Issues:1

White-Phoenix

A tool to recover content from files encrypted with intermittent encryption

Language:PythonLicense:Apache-2.0Stargazers:224Issues:11Issues:5

SkyWrapper

SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS

Language:PythonLicense:MITStargazers:104Issues:28Issues:1

PwnKit-Hunter

PwnKit-Hunter is here to help you check if your systems are vulnerable to CVE-2021-4043, a.k.a. PwnKit

Language:PythonLicense:MITStargazers:26Issues:4Issues:4

PreCog

Discover "HotSpots" - potential spots for credentials theft

Language:PowerShellLicense:NOASSERTIONStargazers:23Issues:4Issues:0
License:Apache-2.0Stargazers:5Issues:3Issues:0

webinars

A collection of Avishay Bar's webinars, slide decks, recordings and overviews