PJM's repositories
BloodHound
Six Degrees of Domain Admin
byob
An open-source post-exploitation framework for students, researchers and developers.
bypass-url-parser
bypass-url-parser
caldera
Automated Adversary Emulation Platform
crackq
CrackQ: A Python Hashcat cracking queue system
DcRat
A simple remote tool written in C#. 一个简单的c#远控
DockerExploit
Docker Remote API Scanner and Exploit
EXOCET-AV-Evasion
EXOCET - AV-evading, undetectable, payload delivery tool
grinder
:mag_right: Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
guimetasploit
Best Graphical Hacking Platform Online
HackTools
The all-in-one browser extension for offensive security professionals 🛠
IntelOwl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
jsql-injection
jSQL Injection is a Java application for automatic SQL database injection.
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
medusa
Binary instrumentation framework based on FRIDA
mobileAudit
Django application that performs SAST and Malware Analysis for Android APKs
Obfuscapk
An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PhantomCrawler
Boost website hits by generating requests from multiple proxy IPs.
RansomwareSim
RansomwareSim is a simulated ransomware
RiskAssessmentFramework
The Secure Coding Framework
rogue-jndi
A malicious LDAP server for JNDI injection attacks
sarenka
OSINT tool - gets data from services like shodan, censys etc. in one app
scemu
shellcode emulator
vagrant
Vagrant is a tool for building and distributing development environments.
wifi-framework
Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.