Chaitanya Krishna's repositories
Ginger-Chai
Ginger Chai crawls static and dynamic links provided within given url
altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
apt2
automated penetration toolkit
Blazy
Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
censys
Python code to query the Censys public scan database.
Cheatsheets
Penetration Testing/Security Cheatsheets
cupp
Common User Passwords Profiler (CUPP)
cve-search
cve-search - a tool to perform local searches for known vulnerabilities
DBC2
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means of communication.
defcon-25-workshop
Windows Post-Exploitation / Malware Forward Engineering DEF CON 25 Workshop
domainhunter
Checks expired domains, bluecoat categorization, and Archive.org history to determine good candidates for phishing and C2 domain names
evilginx
Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.
FruityC2-Client
FruityC2 Client
ip2geo
Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses
netneedle
Network based steganography based control channels and chat.
openvpn-install
OpenVPN road warrior installer for Debian, Ubuntu and CentOS
phishery
An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector
pixiewps
An offline WPS brute-force utility
PracticalMalwareAnalysis-Labs
Binaries for the book Practical Malware Analysis
rainmap-lite
Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
shadowbroker
The Shadow Brokers "Lost In Translation" leak
SLAE32
This repository has been created for completing the requirements of the Security Tube Linux Assembly Expert Certification 32-bit. http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-744
STrelok
Application for STIX v2.0 objects management and analysis
Threat_Intelligence
Threat-Intelligence Feeds & Tools & Frameworks
wifiphisher
Automated victim-customized phishing attacks against Wi-Fi clients