Jan Trikatel's repositories
AdvPhishing
This is Advance Phishing Tool ! OTP PHISHING
archerysec
Centralize Vulnerability Assessment and Management for DevSecOps Team
Astra
Automated Security Testing For REST API's
ATTACK-Tools
Utilities for MITRE™ ATT&CK
bettercap
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
caldera
Scalable Automated Adversary Emulation Platform
can-i-take-over-dns
"Can I take over DNS?" — a list of DNS providers and how to claim (sub)domains via missing hosted zones
cariddi
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more...
commix
Automated All-in-One OS Command Injection Exploitation Tool.
crowdsec
CrowdSec - an open-source massively multiplayer firewall able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global IP reputation database to protect the user network.
faraday
Collaborative Penetration Test and Vulnerability Management Platform
gsocket
Connect like there is no firewall. Securely.
hardening
Hardening Ubuntu. Systemd edition.
huginn
Create agents that monitor and act on your behalf. Your agents are standing by!
ivre
Network recon framework, published by @cea-sec & @ANSSI-FR
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
malicious-pdf
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
maltrail
Malicious traffic detection system
nuclei
Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.
openrpa
Free Open Source Enterprise Grade RPA
PatrowlEngines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
pose-with-style
[SIGGRAPH Asia 2021] Pose with Style: Detail-Preserving Pose-Guided Image Synthesis with Conditional StyleGAN
Real-Time-Voice-Cloning
Clone a voice in 5 seconds to generate arbitrary speech in real-time
RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
sliver
Adversary Emulation Framework
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
SysmonTools
Utilities for Sysmon
vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices