jmckinlay's repositories
swordphish-awareness
Swordphish Phishing Awareness Tool
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
zxcvbn
Low-Budget Password Strength Estimation
king-phisher
Phishing Campaign Toolkit
PwnedPasswordsDLL
Open source solution to check prospective AD passwords against previously breached passwords
fleet
A flexible control server for osquery fleets
lasso
lasso is moving to `vouch/vouch` in January ...an SSO and OAuth login solution for nginx using the auth_request module
Cr3dOv3r
Know the dangers of credential reuse attacks.
velociraptor
Velociraptor hunts for evil...
rconfig
rConfig - Network Configuration Management
kpn-security-policy
KPN Security Policy
youzer
Fake User Generator for Active Directory Environments
ads-payload
Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using environment variables, alternating data streams and wmic.
uAssets
Resources for uBlock Origin, uMatrix: static filter lists, ready-to-use rulesets, etc.
Skadi
Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
credgrap_ie_edge
Extract stored credentials from Internet Explorer and Edge
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
JohnTheRipper
This is the official repo for the Jumbo version of John the Ripper. The "bleeding-jumbo" branch (default) is based on 1.8.0-Jumbo-1 (but we are literally several thousands of commits ahead of it).
hashcat
World's fastest and most advanced password recovery utility
WALKOFF
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
rita-1
Real Intelligence Threat Analytics
pi-hole
A black hole for Internet advertisements
notes
read later
content
This repository contains all Demisto content and from here we share content updates
intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
mercure
Mercure is a tool for security managers who want to train their colleague to phishing.
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.