nocomp's repositories
flipper_sub_plotters_comparers
Flipper SUB Plotters / comparers!
awesome-osint
:scream: A curated list of amazingly awesome OSINT
maldev-for-dummies
A workshop about Malware Development
Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.
PAKURI-THON
PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication server). PAKURI-THON can perform most of the operations with intuitive web operations and commands to chatbots.
Shr3dKit
Red Team Tool Kit
ESP32-Wi-Fi-Penetration-Tool
Wifi Hacking / DDOS Attacks for the ESP32
Chisel-Strike
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.
DeepFaceLive
Real-time face swap for PC streaming or video calls
MANSPIDER
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
fuzz.txt
Potentially dangerous files
recon-my-way
This repository created for personal use and added tools from my latest blog post.
flipper-firmware-roguemaster-azerty-mod
azerty mod for badusb with roguemaster firmware
Flipper-dumps
Playground (and dump) of stuff I make or modify for the Flipper Zero
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
waymore
Find way more from the Wayback Machine!
gshell
A flexible and scalable cross-plaform shell generator tool
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
FlipperAmiibo
Made to be used with Flipper just drag the folder into NFC
collisions
Hash collisions and their exploitations
ForceAdmin
⚡ Create infinite UAC prompts forcing a user to run as admin ⚡
chainsaw
Rapidly Search and Hunt through Windows Event Logs
rfcat-tesla-charging-port-openener
python script for open tesla charging port using rfcat
Expeditus
Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to do this with some level of stealth.
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
octosuite
Advanced Github OSINT Framework
CloudPeler
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.