Alex Samm's repositories
AES-Killer
Burp plugin to decrypt AES Encrypted traffic of mobile apps
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
Bad-Pdf
Steal Net-NTLM Hashes using Bad-PDF
certification-threat-intelligence
Study for threat intelligence certification
diskusage
Basic Linux BASH shell script to display disk usage for mounted storage devices
e013
WiFi password Stealer (for Microsoft Windows)
firmwalker
Script for searching the extracted firmware file system for goodies!
fluxion
Fluxion is a remake of linset by vk496 with less bugs and enhanced functionality.
learn-python
📚 Playground and cheatsheet for learning Python
Memcrashed-DDoS-Exploit
DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
netdata
Get control of your servers. Simple. Effective. Awesome! https://my-netdata.io/
OSCP-cheat-sheet
list of useful commands, shells and notes related to OSCP
p0wnedShell
PowerShell Runspace Post Exploitation Toolkit
PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
PHPMailer
The classic email sending library for PHP
PRET
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
pyrtlsdr
A Python wrapper for librtlsdr (a driver for Realtek RTL2832U based SDR's)
RedHunt-OS
Virtual Machine for Adversary Emulation and Threat Hunting
rfcat
RfCat - swiss-army knife of ISM band radio
routersploit
Exploitation Framework for Embedded Devices
SILENTTRINITY
An asynchronous post-exploitation agent powered by Python, IronPython, C# and .NET's DLR
social_mapper
A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)
Th3inspector
Th3Inspector 🕵️ best tool for Information Gathering 🔎
ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
ThreatHunting
Powershell collection designed to assist in Threat Hunting Windows systems.
tinfoleak
The most complete open-source tool for Twitter intelligence analysis
Tokenvator
A tool to elevate privilege with Windows Tokens
trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
warberry
WarBerryPi - Tactical Exploitation