Cody Thomas's repositories

awesome-osx-command-line

Use your OS X terminal shell to do awesome things.

License:CC-BY-SA-4.0Stargazers:11Issues:0Issues:0

Bella

A pure python, post-exploitation, data mining tool and remote administration tool for macOS.

Language:PythonLicense:MITStargazers:3Issues:0Issues:0

CodeExecutionOnWindows

A list of ways to execute code on Windows using legitimate Windows tools

Stargazers:2Issues:0Issues:0

ProcessHider

Post-exploitation tool for hiding processes from monitoring applications

Language:C++Stargazers:2Issues:0Issues:0

gcat

A PoC backdoor that uses Gmail as a C&C server

Language:PythonLicense:BSD-2-ClauseStargazers:1Issues:0Issues:0

Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

Language:PythonLicense:GPL-3.0Stargazers:1Issues:0Issues:0

ANGRYPUPPY

Bloodhound Attack Path Automation in CobaltStrike

Language:PowerShellLicense:NOASSERTIONStargazers:0Issues:0Issues:0

ApplicationWhitelistBypassTechniques

A Catalog of Application Whitelisting Bypass Techniques

Stargazers:0Issues:0Issues:0
Language:PowerShellStargazers:0Issues:0Issues:0

BloodHound

Six Degrees of Domain Admin

Language:PowerShellLicense:GPL-3.0Stargazers:0Issues:0Issues:0

CredSniper

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

Language:HTMLLicense:Apache-2.0Stargazers:0Issues:2Issues:0

CSharpScripts

Collection of C# scripts

Language:C#Stargazers:0Issues:0Issues:0

cyris

CyRIS: Cyber Range Instantiation System

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

DDEAutoCS

A cobaltstrike script that integrates DDEAuto Attacks

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

defcon-25-workshop

Windows Post-Exploitation / Malware Forward Engineering DEF CON 25 Workshop

Language:CLicense:Apache-2.0Stargazers:0Issues:0Issues:0

FindFrontableDomains

Search for potential frontable domains

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

iMessagesBackdoor

A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

InfoPhish

InfoPath Phishing Repo Resource

Language:PowerShellLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

insert_dylib

Command line utility for inserting a dylib load command into a Mach-O binary

Language:CStargazers:0Issues:0Issues:0

Invoke-TheHash

PowerShell Pass The Hash Utils

Language:PowerShellLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0
License:BSD-3-ClauseStargazers:0Issues:0Issues:0

windows-operating-system-archaeology

windows-operating-system-archaeology @Enigma0x3 @subTee

Language:PowerShellLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

WindowsRegistryRootkit

Kernel rootkit, that lives inside the Windows registry values data

Language:CStargazers:0Issues:0Issues:0

WindowsScriptHostExtension

Extend WSH functionality with Registration-Free COM

Language:C++Stargazers:0Issues:0Issues:0