SBD's repositories
Xenocrates
Python tool developed to create indexes for GIAC certification examinations.
arsenal
Arsenal is just a quick inventory and launcher for hacking programs
blacksheepwall
blacksheepwall is a hostname reconnaissance tool
cortana-scripts
A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
lair-docker
Lair Framework dockerized.
Linux_Exploit_Suggester
Linux Exploit Suggester; based on operating system release number
Mobile-Security-Framework-MobSF
Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.
MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Raspberry-Pi-Looper-synth-drum-thing
My first venture into raspberry pi stuff. Running a custom pure data patch I've been working on for a couple years on a Raspberry Pi 3. This project took a couple months and I'm still tweaking stuff here and there but it's pretty much complete, it even survived it's first live show!
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results along with writing out recommendations for further testing.
Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
Red-Teaming
Collection of Notes and CheatSheets used for Red teaming Certs
VideosSampleCode
Code from the mCoding sample videos
Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.