Endrigo Antonini's repositories
AdoBot
Open-source android spyware
AdoBot-IO
AdoBot NodeJS Server with socket.io
binary-exploitation-intro
A gentle introduction to binary exploitation
bkcrack
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
certspotter
Certificate Transparency Log Monitor
CVE-2019-0708
Scanner PoC for CVE-2019-0708 RDP RCE vuln
cyber-security
Useful cyber security and digital forensics resources
docker-neo4j
Docker Images for the Neo4j Graph Database
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs.
homebridge-ewelink
Homebridge plugin to control Sonoff relays with OEM firmware
mod_ringbuilder
Apache Module Backdoor (PoC)
muraena
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
Network-Security-Password-Cracking
Program to recover passwords
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
password_pwncheck
Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules
PasteHunter
Scanning pastebin with yara rules
Pen-Test-Tools
All the information provided on this site is for educational purposes only.
proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
re-scripts
IDA, Ghidra and Radare2 scripts
reversing-list
Reversing list and Malware binaries research
Scout2
Security auditing tool for AWS environments
sploits
PoC
tarnish
A Chrome extension static analysis tool to help aide in security reviews.
The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers.
viper
Binary analysis and management framework
VulnWhisperer
Create actionable data from your Vulnerability Scans