Tobias Mccurry's repositories

Cloud_crack

Crack passwords using Terraform and AWS

Language:HCLStargazers:41Issues:5Issues:0

wireless_surface_linux_drivers

Theses are known good wireless drivers that work on the surface go

finding_windows_privileges

Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compromise if not evaluated. Privileges can override permission causing a gap of perceived effective permission.

Language:PowerShellLicense:MITStargazers:10Issues:2Issues:0

SendKeys

A deployable tool to send key input per command line.

Language:C#Stargazers:6Issues:1Issues:0

DockerizingTools

This was the steps and dockerfiles that were created during the Leap Day Twitch Stream

Language:DockerfileStargazers:3Issues:2Issues:0

chef-book

The chef-book

Language:RubyStargazers:0Issues:2Issues:0

ClickOnceGenerator

Quick Malicious ClickOnceGenerator for Red Team

Language:C#License:NOASSERTIONStargazers:0Issues:2Issues:0

crossdomain-exploitation-framework

Everything you need to exploit overly permissive crossdomain.xml files

Language:ActionScriptStargazers:0Issues:2Issues:0

EmPyre

A post-exploitation OS X/Linux agent written in Python 2.7

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:2Issues:0
Language:PythonLicense:Apache-2.0Stargazers:0Issues:2Issues:0

imagejs

Small tool to package javascript into a valid image file.

Language:CLicense:GPL-3.0Stargazers:0Issues:2Issues:0

Lime-RAT

LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)

Language:Visual BasicLicense:MITStargazers:0Issues:1Issues:0

meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.

Language:PythonStargazers:0Issues:2Issues:0

PowerSploit

PowerSploit - A PowerShell Post-Exploitation Framework

Language:PowerShellLicense:NOASSERTIONStargazers:0Issues:2Issues:0
Language:PowerShellStargazers:0Issues:2Issues:0

Psychson

Phison 2251-03 (2303) Custom Firmware & Existing Firmware Patches

Language:C#License:MITStargazers:0Issues:2Issues:0

puppet-module-skeleton

A pretty opinionated skeleton for writing your own puppet modules

Language:RubyLicense:Apache-2.0Stargazers:0Issues:2Issues:0

redboard

Collaborative web dashboard for RedTeam pentesters

Language:CSSLicense:AGPL-3.0Stargazers:0Issues:2Issues:0

SharpView

C# implementation of harmj0y's PowerView

Language:C#License:MITStargazers:0Issues:1Issues:0

shields

Concise, consistent, and legible badges in SVG and raster format

Language:JavaScriptLicense:CC0-1.0Stargazers:0Issues:1Issues:0

smartalarm

Smart Alarm is a home security application for the SmartThings home automation system.

Language:GroovyLicense:GPL-3.0Stargazers:0Issues:2Issues:0

snarf

Snarf man-in-the-middle / relay suite

Language:JavaScriptLicense:GPL-2.0Stargazers:0Issues:2Issues:0

terraform-azurerm-network

Terraform Azure RM Module for Network

Language:HCLLicense:MITStargazers:0Issues:1Issues:0

wazuh-ruleset

Wazuh - Ruleset

Language:PythonStargazers:0Issues:0Issues:0

White_Lightning

Platform for Browser Exploitation

Language:PHPStargazers:0Issues:2Issues:0

wifipineapple-wiki

WiFi Pineapple Wiki

Language:ShellLicense:NOASSERTIONStargazers:0Issues:2Issues:0
Stargazers:0Issues:2Issues:0

yubico-pam

Yubico Pluggable Authentication Module (PAM)

Language:CLicense:BSD-2-ClauseStargazers:0Issues:2Issues:0