Rick's repositories
Afuzz
Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.
auto-redteam
Redteaming LLMs using other LLMs
Avalonia
A cross-platform UI framework for .NET
awesome-chatgpt
⚡ Everything about ChatGPT
Bug-Bounty-Wordlists
A repository that includes all the important wordlists used while bug hunting.
cariddi
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
CaveCarver
CaveCarver - PE backdooring tool which utilizes and automates code cave technique
chatgpt-prompts-bug-bounty
ChatGPT Prompts for Bug Bounty & Pentesting
DevSecOps
🔱 Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎
exposelab
This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.
freeMetsrvLoader
freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package
frilane
Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane
fuzz4bounty
Awesome wordlists for Bug Bounty Hunting
Hack-Tools
The all-in-one Red Team extension for Web Pentester 🛠
HardHatC2
A c# Command & Control framework
HeapCrypt
Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap
honeypots
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
KLogger
Remote persistent 🔑Logger for Windows and Linux
Linux-Post-Exploitation
Tips, Tricks, and Scripts for Linux Post Exploitation
Memory-Shell
The king of shell -Javaweb Memory Shell
ownlist
Periodic compilation of offensive security tools and write-ups
pgrok
Poor man's ngrok - a multi-tenant HTTP reverse tunnel solution through SSH remote port forwarding
phoneinfoga
Information gathering framework for phone numbers
ProtectMyTooling
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.
Rafel-Rat
-------> RAFEL<------ Android Rat Written in Java With WebPanel For Controlling Victims...Hack Android Devices
Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
simple-keylogger
This is a simple keylogger program written in Python using the pynput and re libraries. It captures all the user's keystrokes and saves them to a file, which can then be analyzed to search for email addresses and passwords. The program uses regular expressions to search for patterns that match the standard email and password formats.
Telegram-Stealer
Steal Telegram Session bypass 2fa using powershell script
Tutorial-AndroidNetworkInterception
How to intercept network trafic on Android