reza.duty's repositories
AWSome-Pentesting
My cheatsheet notes to pentest AWS infrastructure
DeFiHackLabs
Reproduce DeFi hacked incidents using Foundry.
Web3-Security-Library
Information about web3 security and programming tutorials/tools
collisions
Hash collisions and exploitations
detection-rules
Rules for Elastic Security's detection engine
Elemental
Elemental - An ATT&CK Threat Library
FlavorTown
Various ways to execute shellcode
garble
Obfuscate Go builds
Ghostpack-CompiledBinaries
Compiled Binaries for Ghostpack (.NET v4.0)
GOAD
game of active directory
hardentools
Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.
Havoc
The Havoc Framework
How-to-run
立党老师的润学(零基础转码/移民/留学/海外创业/永居)笔记
JNDI-Injection-Exploit-Plus
50+ Gadgets(20 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.
laZzzy
laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.
ldapnomnom
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
mihari
A tool for OSINT based threat hunting
obsidian-osint-templates
These templates are suggestions of how the Obsidian notetaking tool can be used during an OSINT investigation. The example data in those files should allow you to make some connections (see what I did there?) between how you record your data during an investigation and some of what the tool can offer FOR FREE!
pentesting-cookbook
A set of recipes useful in pentesting and red teaming scenarios
PEzor
Open-Source Shellcode & PE Packer
SecGen
Create randomly insecure VMs
ShellcodeLoader
该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用
stf
Control and manage Android devices from your browser.
uptime-kuma
A fancy self-hosted monitoring tool
VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
Ventoy
A new bootable USB solution.
w5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
znote-app
znote.io public repository