febiNJ's repositories
arithmo-gather
Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MICR , IFSC , Phone number
privesc-post_exploit-collection
This is a collection of post exploitation and privilege escalation tools for both linux and windows machines
bug-bounty-dorks
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
fry-cracker
FRY-CRACKER....A simple, handy dictionary attack tool for password hash cracking...
hack-tools
hack tools
web_reamer
WEB_REAMER is a handy tool for web pentesters & bug hunters!
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
ADRecon
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
AndroidReverseShell-1
A simple reverse tcp shell example for Android
AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
awesome-incident-response
A curated list of tools for incident response
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
EvasiveProcessHollowing
Evasive Process Hollowing Techniques
github-dorks
Collection of github dorks and helper tool to automate the process of checking dorks
pe_to_shellcode
Converts PE into a shellcode
PENTESTING-BIBLE
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
TechNet-Gallery
Copies of my 'Script Center' and 'Technet Gallery' publications