huongAT's repositories
the-art-of-command-line
Master the command line, in one page
Hijacker
Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android
adventofcode-2015
Advent of Code 2015 puzzles and solutions
bash2048
Bash implementation of 2048 game
ivre
Network recon framework.
PoCSubjectInterfacePackage
A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
SSHPry2.0
SSHPry v2 - Spy & Control os SSH Connected client's TTY
CVE-2017-12615
POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.
bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
Win10PostExploits
post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
Fingerprinter
CMS/LMS/Library etc Versions Fingerprinter
CVE-2017-8759
Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
exploit-CVE-2017-7494
SambaCry exploit and vulnerable container (CVE-2017-7494)
SSRF-Testing
SSRF (Server Side Request Forgery) testing resources
RAT-via-Telegram
Windows Remote Administration Tool via Telegram
EmpireDog
A collection of PowerShell Modules for BloodHound/Empire Orchestration
Zeus
AWS Auditing & Hardening Tool
vlany
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
ziVA
An iOS kernel exploit designated to work on all iOS devices <= 10.3.1
DropboxC2C
DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
Vulnerable-OTP-Application
Vulnerable OTP/2FA Application written in PHP using Google Authenticator
linux-exploit-suggester
Linux privilege escalation auditing tool
portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
blog_sv
fun
dnssearch
A subdomain enumeration tool.
frp
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
Keylogger
A simple keylogger for Windows, Linux and Mac