missing's repositories
bettercap
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and attacks.
bucket-stream
Find interesting Amazon S3 Buckets by watching certificate transparency logs.
CrackMapExec
A swiss army knife for pentesting networks
CVE-2018-8120
CVE-2018-8120 Windows LPE exploit
dirsearch
Web path scanner
fail2ban
Daemon to ban hosts that cause multiple authentication errors
grumpy
Grumpy is a Python to Go source code transcompiler and runtime.
icebreaker
Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment
impacket
Impacket is a collection of Python classes for working with network protocols.
Internal-Monologue
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
koadic
Koadic C3 COM Command & Control - JScript RAT
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
macOS-Security-and-Privacy-Guide
A practical guide to securing macOS.
merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
monkey
Infection Monkey - An automated pentest tool
oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
onelinerizer
Convert any Python file into a single line of code
OSSEM
Open Source Security Events Metadata (OSSEM)
pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
pypykatz
Mimikatz implementation in pure Python
pywinrm
Python library for Windows Remote Management (WinRM)
Seth
Perform a MitM attack and extract clear text credentials from RDP connections
SoftEtherVPN
SoftEther VPN (Developer Edition Master Repository): Open Cross-platform Multi-protocol VPN Software. This repository has experimental codes. Pull requests are welcome. Also, Stable Edition is available on https://github.com/SoftEtherVPN/SoftEtherVPN_Stable which the non-developer user can stable use.
ssh-mitm
SSH man-in-the-middle tool
tf-serve
Serve TensforFlow Estimator with SavedModel
ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
uvloop
Ultra fast asyncio event loop.
Xenos
Windows dll injector