George Seeto's repositories
leonidas
Automated Attack Simulation in the Cloud, complete with detection use cases.
h8mail
Password Breach Hunting & Email OSINT tool, locally or using premium services. Supports chasing down related email
SecureX-HaveIBeenPwned
How to install Have I been pwned for Cisco's SecureX walk through using Ubuntu 20.04 as the desktop environment
ScriptedAmigaEmulator
Amiga Emulator in javascript and HTML5
BabyShark
Basic C2 Server
FMC-route-copy
Copy Routes from one FTD Sensor to another managed by the same FMC
saycheese
Grab target's webcam shots by link
aws_consoler
A utility to convert your AWS CLI credentials into AWS console access.
npk
A mostly-serverless distributed hash cracking platform
nuclei-templates
Community curated list of template files for the nuclei engine
nuclei
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
zxcvbn
Low-Budget Password Strength Estimation
pwndrop
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
MITM-cheatsheet
All MITM attacks in one place.
metrics-server
Cluster-wide aggregator of resource usage data.
k8sviz
Generate Kubernetes architecture diagrams from the actual state in a namespace
awspx
A graph-based tool for visualizing effective access and resource relationships in AWS environments.
k8s-pod-rbac-breakout
Kubernetes Pod RBAC Breakout
security_monkey
Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
DeathAndTaxes
The source code for Placeholder Gameworks' debut title "Death and Taxes", of which I did the coding.
markovify
A simple, extensible Markov chain generator.
sayhello
Capturing audio (.wav) from target using a link
SUDO_KILLER
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo
Python
All Algorithms implemented in Python
XSS-Freak
XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible links and directories to expand its attack scope. then it searches them for inputs tags and then launches a bunch of xss payloads. if an inputs is not sanitized and vulnerable to xss attacks, the tool will discover it in seconds.
ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
the-art-of-command-line
Master the command line, in one page
jsemu
A list of emulators written in the JavaScript programming language
Chaos
Visualizations of the connections between chaos theory and fractals through the logistic map; made for Veritasium YouTube video
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF