modulexcite's repositories
FileSignatures
A small library for detecting the type of a file based on header signature (also known as magic number).
SharpNamedPipePTH
Pass the Hash to a named pipe for token Impersonation
30-Days-Of-React
30 Days of React challenge is a step by step guide to learn React in 30 days. It requires HTML, CSS, and JavaScript knowledge. You should be comfortable with JavaScript before you start to React. If you are not comfortable with JavaScript check out 30DaysOfJavaScript. This is a continuation of 30 Days Of JS. This challenge may take more than 100 days, follow your own pace.
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
bincat
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
dalfox
🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
droid
DROID (Digital Record and Object Identification)
dupeguru
Find duplicate files
k8s-wordsmith-demo
Sample project with Docker containers running under Kubernetes
linkinator
🐿 Scurry around your site and find all those broken links.
lookyloo
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
macos-virtualbox
Push-button installer of macOS Catalina, Mojave, and High Sierra guests in Virtualbox for Windows, Linux, and macOS
nmap-1
Idiomatic nmap library for go developers
Pentest-tools-1
Intranet penetration tools
python-cheatsheet
Comprehensive Python Cheatsheet
python-magic
A python wrapper for libmagic
shad0w
A post exploitation framework designed to operate covertly on heavily monitored environments
SonarSearch
A MongoDB importer and API for Project Sonars DNS datasets
ssh-audit
SSH server & client auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Stormspotter
Azure Red Team tool for graphing Azure and Azure Active Directory objects
threagile
Agile Threat Modeling Toolkit
volatility3
Volatility 3.0 development
WebHackersWeapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
wordlists
Automated & Manual Wordlists provided by Assetnote
zphisher
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !