elektrikalan's starred repositories
hakoriginfinder
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
SharpSecDump
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
E4GL30S1NT
E4GL30S1NT - Simple Information Gathering Tool
delete-self-poc
A way to delete a locked file, or current running executable, on disk.
Amsi_Bypass_In_2023
Amsi Bypass payload that works on Windwos 11
LFI-FINDER
LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities
ecommerce-microservices-spring-reactive-webflux
E-commerce demo with spring reactive webflux and spring cloud microservice
tw1tter0s1nt
Python tool that automates the process of Twitter OSiNT investigation using twint.
Invoke-SessionHunter
Retrieve and display information about active user sessions on remote computers. No admin privileges required.
Long-Live-The-Empire
A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing on the open-source Empire C2 framework.
awesome-docker-malware-analysis
Repository of tools and resources for analyzing Docker containers
WindowsInternals
Experiments on the Windows Internals
Automated-CME-Password-Spraying
A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout Threshold and a Reset Account Lockout Counter.
empire-docs
https://bc-security.gitbook.io/empire-wiki/
VirusTotalQuery
This PowerShell script allows you to query VirusTotal API for threat intelligence data. Given an input CSV file containing a list of IPs, URLs, or file hashes, the script will contact VirusTotal API and retrieve information about how many security vendors have flagged the input as malicious.