Moriarty2016's repositories
atomic-red-team
Small and highly portable detection tests.
dnscrypt-proxy
A flexible DNS proxy, with support for encrypted DNS protocols.
LaZagneForensic
Windows passwords decryption from dump files
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
amass
Subdomain Enumeration in Go
angr
The next-generation binary analysis platform from UC Santa Barbara's Seclab!
cisco-snmp-rce
Cisco IOS SNMP RCE PoC
ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
harpoon
CLI tool for open source and threat intelligence
iBoot
Source code for a core component of the iPhone's operating system
IntelliJ-IDEA-Tutorial
IntelliJ IDEA 简体中文专题教程
Invoke-DOSfuscation
Cmd.exe Command Obfuscation Generator & Detection Test Harness
linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
meltdown-exploit
Meltdown Exploit PoC
NTDSDumpEx
NTDS.dit offline dumper with non-elevated
obfusion
Obfusion - C++ X86 Code Obfuscation Library
One-Lin3r
Gives you one-liners that aids in penetration testing operations
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
privdns
Check dns servers for reverse resolving private ips
pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
pwntools
CTF framework and exploit development library
Sickle
A tool I have found incredibly useful whenever creating custom shellcode.
Triton
Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings.
venom
venom (metasploit) shellcode generator/compiler/listener
WHP
Micro$oft Windows Hacking Pack