therealwolf (kobs0N)

kobs0N

Geek Repo

Company:@Zero-Defense-Labs

Home Page:https://zero-defense.com

Twitter:@kobsoNinja

Github PK Tool:Github PK Tool

therealwolf's repositories

Active-Directory-Exploitation-Cheat-Sheet

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

License:MITStargazers:1Issues:1Issues:0

bruteforce-lists

Some files for bruteforcing certain things.

License:Apache-2.0Stargazers:1Issues:2Issues:0

git-hound

Reconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.

Language:GoLicense:MITStargazers:1Issues:0Issues:0

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

Language:PythonLicense:NOASSERTIONStargazers:1Issues:0Issues:0

WindowsExploitationResources

Resources for Windows exploit development

Stargazers:1Issues:0Issues:0

403-SC-Bypasser

An easy-to-use script for bypassing 403 status codes.

Language:ShellStargazers:0Issues:0Issues:0

AMSITrigger

The Hunt for Malicious Strings

License:GPL-3.0Stargazers:0Issues:0Issues:0

awesome-bugbounty-builder

Awesome Bug bounty builder Project

Language:ShellLicense:GPL-3.0Stargazers:0Issues:0Issues:0

Awesome-WAF

🔥 Web-application firewalls (WAFs) from security standpoint.

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:0Issues:0

BOF

Buffer Overflows

Language:PythonStargazers:0Issues:1Issues:0

C2concealer

C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

CVE-2022-25636

CVE-2022-25636 - Linux 5.13 Privilege Escalation

Language:CStargazers:0Issues:0Issues:0

emba

emba - An analyzer for Linux-based firmware of embedded devices.

Language:ShellLicense:GPL-3.0Stargazers:0Issues:0Issues:0

gospider

Gospider - Fast web spider written in Go

License:MITStargazers:0Issues:0Issues:0

Inveigh

.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers

License:BSD-3-ClauseStargazers:0Issues:0Issues:0

JNDI-Exploit-Kit

JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)

Language:JavaLicense:MITStargazers:0Issues:0Issues:0

Malleable-C2-Profiles

Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/.

Stargazers:0Issues:0Issues:0

OSEP-Code-Snippets

A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.

Language:C#Stargazers:0Issues:0Issues:0

OSWE

OSWE Preparation

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

PoC

Proofs-of-concept

Stargazers:0Issues:0Issues:0

ReconHunter

Red Team Mind Map

Language:ShellStargazers:0Issues:0Issues:0

TFNP

Techniques For Network Ports

Language:PythonStargazers:0Issues:0Issues:0

the-nuclei-templates

Nuclei templates

License:MITStargazers:0Issues:0Issues:0

Tiny-PHP-Webshell

several list of simple and obfuscate PHP shell

Stargazers:0Issues:0Issues:0

windbg-cheat-sheet

My personal cheat sheet for using WinDbg for kernel debugging

Language:JavaScriptStargazers:0Issues:1Issues:0

Windows-Post-Exploitation

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

Stargazers:0Issues:0Issues:0

WindowsOldExploits

Awesome tools to exploit Windows !

Stargazers:0Issues:0Issues:0