jabdy86's repositories
AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
AFLplusplus
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
BARK
BloodHound Attack Research Kit
BloodHound-Queries
Custom queries list for BloodHound
cloud-custodian
Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
CloudShovel
A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.
core
OPNsense GUI, API and systems backend
CVE-2024-38200
CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability
donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
keycloak
Open Source Identity and Access Management For Modern Applications and Services
MalBox
MalBox is a quick and dirty setup to create a malware analysis VM
mininet-wifi
Emulator for Software-Defined Wireless Networks
Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
opencti
Open Cyber Threat Intelligence Platform
packetfence
PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) solution.
PcapNinja
A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and provides insights based on the captured data.
PowerHub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Red-Infra-Craft
RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advanced phishing & payload infras
Rust-for-Malware-Development
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
S3Scanner
Scan for misconfigured S3 buckets across S3-compatible APIs!
testssl.sh
Testing TLS/SSL encryption anywhere on any port
TrickDump
Dump lsass using only NTAPIS running 3 programs to create 3 JSON and 1 ZIP file... and generate the Minidump later!
vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
wazuh
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
whad-client
Wireless Hacking Devices Protocol client
WindowsDowndate
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
wstunnel
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available