gadoi's repositories
ADRecon
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
exploitdb-bin-sploits
Exploit Database binary exploits located in the /sploits directory
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hurt
Hurt Toolkit v1.0.4( New Update), Copyright (c) 2019 Indonesian Hurt Security All Rights Reserved.
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
TorghostNG
TorghostNG 1.4 - Giúp bạn kết nối Internet ẩn danh qua Tor. Được gõ lại từ TorGhost với Python 3. Hỗ trợ Privoxy
DisableWinTracking
Uses some known methods that attempt to minimize tracking in Windows 10
xencrypt
A PowerShell script anti-virus evasion tool
GobyVuls
Vulnerabilities of Goby supported with exploitation.
whoogle-search
Self-hosted, ad-free, privacy-respecting Google metasearch engine
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
pdns
PowerDNS Authoritative, PowerDNS Recursor, dnsdist
ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
gtfo
Search gtfobins and lolbas files from your terminal
ddos-deflate
Fork of DDoS Deflate with fixes, improvements and new features.
iptables-essentials
Iptables Essentials: Common Firewall Rules and Commands.
Powerexploit
Post exploitation module for pentesters and hackers.
the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Tentacle
Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bulk vulnerability verification for multiple targets.
Katana
A Python Tool For google Hacking
spraykatz
Credentials gathering tool automating remote procdump and parse of lsass process.
GreatSCT
The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.
fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
gnos-sockets
:feet: Colorful IP sockets list
PrivescCheck
Privilege Escalation Enumeration Script for Windows
yacy_search_server
Distributed Peer-to-Peer Web Search Engine and Intranet Search Appliance
Microsoft-Activation-Scripts
A collection of scripts for activating Microsoft products using HWID / KMS38 / Online KMS activation methods with a focus on open-source code, less antivirus detection and user-friendliness.
How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.
PsCabesha-tools
Powershell crazy and sometimes diabolic scripts