Endrigo Antonini's repositories
CloudFlair
🔎 Find origin servers of websites behind by CloudFlare using Internet-wide scan data from Censys.
LinkFinder
A python script that finds endpoints in JavaScript files
maven-dependencies-analyser
Maven plugin that analyses and validates Maven dependencies of a project.
awesome-risks
Sample Risks for a Software Project
AWS-IAM-Privilege-Escalation
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
Check-LocalAdminHash
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to determine if the provided credential is a local administrator. It's useful if you obtain a password hash for a user and want to see where they are local admin on a network. It is essentially a Frankenstein of two of my favorite tools along with some of my own code. It utilizes Kevin Robertson's (@kevin_robertson) Invoke-TheHash project for the credential checking portion. Additionally, the script utilizes modules from PowerView by Will Schroeder (@harmj0y) and Matt Graeber (@mattifestation) to enumerate domain computers to find targets for testing admin access against.
DeepFaceLab
DeepFaceLab is a tool that utilizes machine learning to replace faces in videos. Includes prebuilt ready to work standalone Windows 7,8,10 binary (look readme.md).
dns
DNS library in Go
fpmvuln
bash poc scripts to exploit open fpm ports
gitomatic
A tool to monitor git repositories and automatically pull & push changes
goop
Google Search Scraper
hashes
Magic hashes – PHP hash "collisions"
manager
Distributed port scan manager
nvdtools
A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)
OSSEM
Open Source Security Events Metadata (OSSEM)
passphrase-wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
Penetration-Testing-Tools
Great collection of my Penetration Testing scripts, tools, cheatsheets collected over years, used during real-world assignments or collected from various good quality sources.
pix2pixHD
Synthesizing and manipulating 2048x1024 images with conditional GANs
proxychains-ng
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project.
Real-Time-Voice-Cloning
Clone a voice in 5 seconds to generate arbitrary speech in real-time
reference-architectures
Get up and running quickly with one of our reference architecture using our fully automated cold-start process.
repokid
AWS Least Privilege for Distributed, High-Velocity Deployment
shellcodetester
An application to test windows shellcodes
terrascan
Collection of security and best practice test for static code analysis of terraform templates
trivy
A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
vitess
Vitess is a database clustering system for horizontal scaling of MySQL.
watchgod
Simple, modern file watching and code reload in python.
WhatsApp-Clone-Tutorial
https://www.tortilla.academy/Urigo/WhatsApp-Clone-Tutorial