Agent Overiide's starred repositories

1033-OTA-Downgrader

First ever tool to downgrade ANY iPhone 5s, ANY iPad Air and (almost any) iPad Mini 2 to 10.3.3 with OTA blobs + checkm8!

Language:ShellStargazers:492Issues:0Issues:0

LNKUp

Generates malicious LNK file payloads for data exfiltration

Language:PythonStargazers:324Issues:0Issues:0

puppeteer-cluster

Puppeteer Pool, run a cluster of instances in parallel

Language:TypeScriptLicense:MITStargazers:3136Issues:0Issues:0

CarbonCopy

A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux

Language:PythonLicense:Apache-2.0Stargazers:1272Issues:0Issues:0

COMahawk

Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322

Language:C++Stargazers:348Issues:0Issues:0

SCShell

Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

Language:CStargazers:1357Issues:0Issues:0

CVE-Stockpile

Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.

Language:CStargazers:45Issues:0Issues:0

docker-nextcloud

Nextcloud Docker image

Language:DockerfileLicense:MITStargazers:233Issues:0Issues:0

ffuf

Fast web fuzzer written in Go

Language:GoLicense:MITStargazers:11774Issues:0Issues:0
Language:JavaScriptStargazers:27Issues:0Issues:0

flic

Design and implementation of FLIC: Frequency Layered Information Code, a barcode format designed for high information density.

Language:JavaScriptLicense:NOASSERTIONStargazers:2Issues:0Issues:0

Pentest-and-Development-Tips

A collection of pentest and development tips

Stargazers:1092Issues:0Issues:0

pwnshop

Exploit Development, Reverse Engineering & Cryptography

Language:PythonStargazers:244Issues:0Issues:0

CrimeBoards

A list of private and public (more or less) blackhat boards

Stargazers:258Issues:0Issues:0

discover

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.

Language:PowerShellLicense:MITStargazers:3374Issues:0Issues:0

my-arsenal-of-aws-security-tools

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Language:ShellLicense:Apache-2.0Stargazers:8789Issues:0Issues:0

PANhunt

PANhunt searches for credit card numbers (PANs) in directories.

Language:PythonLicense:BSD-3-ClauseStargazers:133Issues:0Issues:0

ascii-art-action

GitHub Action for printing out ASCII art text

Language:RubyLicense:MITStargazers:17Issues:0Issues:0

wifi-cracking

Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat

License:MITStargazers:11195Issues:0Issues:0

IntruderPayloads

A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

Language:BlitzBasicStargazers:3566Issues:0Issues:0

fuzzDicts

Web Pentesting Fuzz 字典,一个就够了。

Language:PythonStargazers:7188Issues:0Issues:0

ionic-framework

A powerful cross-platform UI toolkit for building native-quality iOS, Android, and Progressive Web Apps with HTML, CSS, and JavaScript.

Language:TypeScriptLicense:MITStargazers:50599Issues:0Issues:0

Simjacker-

Simjacker vulnerability actively exploited to track, spy on mobile phone owners Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted surveillance of mobile phone users. simjacker The vulnerability and its associated attacks have been named Simjacker as it involves the hijacking of SIM cards and threatens mobile phone users across the globe. What does Simjacker do? Simjacker extracts the location information of mobile phone users from vulnerable operators, retrieved using malicious SMS messages. The location information of thousands of devices was obtained over time without the knowledge or consent of the targeted mobile phone users. Based on previous intelligence, it is likely that these attacks originated from a surveillance company which works with governments, to track and monitor individuals; bypassing existing signalling protection. “Simjacker represents a clear danger to the mobile operators and subscribers. This is potentially the most sophisticated attack ever seen over core mobile networks. It’s a major wake-up call that shows hostile actors are investing heavily in increasingly complex and creative ways to undermine network security. This compromises the security and trust of customers, mobile operators and impacts the national security of entire countries,” said Cathal Mc Daid, CTO, AdaptiveMobile Security. A multitude of attacks While the primary attack detected involved the retrieval of mobile phone locations, Simjacker has been further exploited to perform many other types of attacks against individuals and mobile operators such as fraud, scam calls, information leakage, denial of service and espionage. AdaptiveMobile Security Threat Intelligence analysts observed the hackers vary their attacks, testing many of these further exploits. simjacker All makes and models of mobile phone are open to attack In theory, all makes and models of mobile phone are open to attack as the vulnerability is linked to a technology embedded on SIM cards. AdaptiveMobile Security research indicates that the Simjacker vulnerability could extend to over 1 billion mobile phone users globally, potentially impacting countries in North and South America, West Africa, Europe, Middle East and indeed any region of the world where this SIM card technology is in use. Mc Daid continued, “Simjacker worked so well and was being successfully exploited for years because it took advantage of a combination of complex interfaces and obscure technologies, showing that mobile operators cannot rely on standard established defences. Now that this vulnerability has been revealed, we fully expect the exploit authors and other malicious actors will try to evolve these attacks into other areas”.

Stargazers:28Issues:0Issues:0

awesome-shodan-queries

🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻

License:CC0-1.0Stargazers:5255Issues:0Issues:0

flex-layout

Provides HTML UI layout for Angular applications; using Flexbox and a Responsive API

Language:TypeScriptLicense:MITStargazers:5908Issues:0Issues:0

crud

NestJs CRUD for RESTful APIs

Language:TypeScriptLicense:MITStargazers:3988Issues:0Issues:0

vscode

Visual Studio Code

Language:TypeScriptLicense:MITStargazers:159932Issues:0Issues:0

components

Component infrastructure and Material Design components for Angular

Language:TypeScriptLicense:MITStargazers:24193Issues:0Issues:0

faceswap

Deepfakes Software For All

Language:PythonLicense:GPL-3.0Stargazers:49737Issues:0Issues:0