Seth Feldman (iamfuntime)

iamfuntime

Geek Repo

Location:Charleston, SC

Twitter:@_funtime

Github PK Tool:Github PK Tool

Seth Feldman's repositories

unimap

Enumeration Scanner utilizing unicornscan, nmap, and other enumeration tools

Language:PythonStargazers:6Issues:2Issues:0

security-cheatsheets

A collection of cheatsheets for various infosec tools and topics.

iamfuntime.github.io

Build a beautiful and simple website in literally minutes. Demo at http://deanattali.com/beautiful-jekyll

Language:HTMLLicense:MITStargazers:0Issues:0Issues:0

LinEnum

Scripted Local Linux Enumeration & Privilege Escalation Checks

Language:ShellStargazers:0Issues:2Issues:0

post-exploitation

Post Exploitation Collection

Language:CStargazers:0Issues:2Issues:0

ptf

The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

Language:PythonStargazers:0Issues:2Issues:0

pwnwiki.github.io

PwnWiki - The notes section of the pentesters mind.

Language:HTMLLicense:MITStargazers:0Issues:2Issues:0

Reconnoitre

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing. Included virtual host scanner.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

Responder

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

SecLists

SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.

Language:PHPStargazers:0Issues:2Issues:0

unix-privesc-check

Automatically exported from code.google.com/p/unix-privesc-check

Language:ShellStargazers:0Issues:2Issues:0

Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

windows-pentest

Windows Pentest Scripts

Language:PowerShellStargazers:0Issues:0Issues:0

windows-privesc-check

Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems

Language:PythonStargazers:0Issues:2Issues:0

WindowsExploits

Windows exploits, mostly precompiled.

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

YaraPcap

Process HTTP Pcaps With YARA

Language:PythonStargazers:0Issues:1Issues:0