Mike Anderson's repositories
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
CipherDecrypter
Attempt at a substitution cipher decrypter - work in progress
client-server
A client/server written in C/C++
cypheroth
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
cyphon
Open source incident management and response platform.
Empire
Empire is a PowerShell and Python post-exploitation agent.
hcxdumptool
Small tool to capture packets from wlan devices.
hcxtools
Portable solution for capturing wlan traffic and conversion to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = capture, convert and calculate candidates, x = different hashtypes
impacket
Impacket is a collection of Python classes for working with network protocols.
iodine
Official git repo for iodine dns tunnel
listmap
Create lists from nmap output.
MailSniper
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain.
masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
mimikatz
A little tool to play with Windows security
nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
PrivExchange
Exchange your privileges for Domain Admin privs by abusing Exchange
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
StudentResources
A repository for cybersecurity students
SysmonSearch
Investigate suspicious activity by visualizing Sysmon's event log
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Veil
Veil 3.1.X (Check version info in Veil at runtime)
volatility
An advanced memory forensics framework
xsser
From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras