detro's repositories
static_file_analysis
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Windows10Debloater
Script to remove Windows 10 bloatware.
BadMod
CMS auto detect and exploit.
ClickOnceGenerator
Quick Malicious ClickOnceGenerator for Red Team
deception-as-detection
:honeybee: Deception based detection techniques mapped to the MITRE’s ATT&CK framework
eaphammer
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
Interceptor
Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space
LeakLooker
Find open databases with Shodan
malware-ioc
Indicators of Compromises (IOC) of our various investigations
mec
for concurrent exploiting
Mercury
Mercury is a hacking tool used to collect information and use the information to further hurt the target
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
poopy-test
fresh-test-iocsss
PRETty
"PRinter Exploitation Toolkit" LAN automation tool
TA-cyberchef
A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.
tinfoleak
The most complete open-source tool for Twitter intelligence analysis
trackerjacker
Like nmap for mapping wifi networks you're not connected to, plus device tracking
wifite2
Rewrite of the popular wireless network auditor, "wifite"
XSRFProbe
The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.