febiNJ's repositories
arithmo-gather
Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MICR , IFSC , Phone number
privesc-post_exploit-collection
This is a collection of post exploitation and privilege escalation tools for both linux and windows machines
bug-bounty-dorks
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
hack-tools
hack tools
web_reamer
WEB_REAMER is a handy tool for web pentesters & bug hunters!
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
ADRecon
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
AndroidReverseShell-1
A simple reverse tcp shell example for Android
AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
awesome-incident-response
A curated list of tools for incident response
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
EvasiveProcessHollowing
Evasive Process Hollowing Techniques
GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
github-dorks
Collection of github dorks and helper tool to automate the process of checking dorks
keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
pe_to_shellcode
Converts PE into a shellcode
PENTESTING-BIBLE
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
powercat
netshell features all in version 2 powershell
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
PS2EXE
Module to compile powershell scripts to executables
TechNet-Gallery
Copies of my 'Script Center' and 'Technet Gallery' publications
windows_privesc-post_exploitation
Windows Privilege Escalation and Post exploitation Techniques , concepts for pentesters