Cereal's repositories
.tmux
🇫🇷 Oh my tmux! My self-contained, pretty & versatile tmux configuration made with ❤️
aws-cheatsheet
A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
BloodHound
Six Degrees of Domain Admin
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
Cybersecurity-Notes
My Markdown notes for all things cybersecurity
dotfiles
dotfiles symbolic links management CLI
Ethical-Hacking-Labs
Practical Ethical Hacking Labs 🗡🛡
hugo-theme-hello-friend
Pretty basic theme for Hugo that covers all of the essentials. All you have to do is start typing!
lazydocker
The lazier way to manage everything docker
Mythic
A collaborative, multi-platform, red teaming framework
OSCP
Our OSCP repo: from popping shells to mental health.
kickstart.nvim
A launch point for your personal nvim configuration
maldev
⚠️ malware development
MalwareDNA
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
OSCP-Guide
OSCP Guide
parrot-build
Ansible Scripts to Build Out My Parrot
passer
Passive service locator, a python sniffer that identifies servers, clients, names and much more
PENTESTING-BIBLE
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Periscope
Fully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation)
signature-base
YARA signature and IOC database for my scanners and tools
Striker
A Command and Control (C2)
SubSeven
SubSeven Legacy Official Source Code Repository
TJ-JPT
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
updog
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
vulnerable-AD-plus
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
web-check
🕵️♂️ All-in-one OSINT tool for analysing any website