Moriarty2016's repositories
AggressorScripts
Aggressor scripts for use with Cobalt Strike 3.0+
Breacher
An advanced multithreaded admin panel finder written in python.
CheatSheets
Cheat sheets for various projects.
cmsPoc
CMS渗透测试框架-A CMS Exploit Framework
CobaltStrike-ToolKit
Some useful scripts for CobaltStrike
cve-search
cve-search - a tool to perform local searches for known vulnerabilities
dbeaver
Free universal database manager and SQL client
docker-onion-nmap
Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
ExternalC2
A library for integrating communication channels with the Cobalt Strike External C2 server
FruityC2
FruityC2 Server
HostRecon
This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance phase. It gathers information about the local system, users, and domain information. It does not use any 'net', 'ipconfig', 'whoami', 'netstat', or other system commands to help avoid detection.
Invoke-SocksProxy
Socks proxy server using powershell.
MemoryModule
Library to load a DLL from memory.
odat
ODAT: Oracle Database Attacking Tool
PaperAirplane
一个类似于Proxifier的SOCKS5代理工具
pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
QuasarRAT
Remote Administration Tool for Windows
ShadowsocksX-NG-R
Next Generation of ShadowsocksX
SigThief
Stealing Signatures and Making One Invalid Signature at a Time
sRDI
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
ThunderShell
PowerShell based RAT
Tor2web
Tor2web is an HTTP proxy software that enables access to Tor Hidden Services by mean of common web browsers
trape
People tracker on the Internet: Learn to track the world, to avoid being traced.
trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
yeti
Your Everyday Threat Intelligence