tjnull's repositories

TJ-JPT

This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin

TJ-OSINT-Notebook

This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to performing reconaissance and OSINT operations. This Notebook has helped me in many situations to learn more about OSINT and how to analyze the data that is out there on the internet.

OSCP-Stuff

List of Stuff I did to get through the OSCP :D

Language:PythonStargazers:175Issues:9Issues:0

pentest-arsenal

A collection of tools that I use in CTF's or for assessments

Language:PowerShellStargazers:48Issues:2Issues:0

exploit-dev

Repo for preparing for OSCE but to learn more about exploit development

Language:PythonStargazers:6Issues:1Issues:0

hosts

Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.

Language:PythonLicense:MITStargazers:4Issues:0Issues:0
Language:PowerShellStargazers:2Issues:0Issues:0

at-ps

Adversary Tactics - PowerShell Training

Language:PowerShellLicense:NOASSERTIONStargazers:1Issues:0Issues:0
Language:HTMLLicense:MITStargazers:1Issues:0Issues:0

Malleable-C2-Profiles

Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/.

Stargazers:0Issues:0Issues:0

merlin

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Language:GoLicense:GPL-3.0Stargazers:0Issues:0Issues:0
Language:GoLicense:GPL-3.0Stargazers:0Issues:0Issues:0

qFlipper

qFlipper — desktop application for updating Flipper Zero firmware via PC

Language:C++License:GPL-3.0Stargazers:0Issues:0Issues:0

sysmon-config

Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.

License:LGPL-2.1Stargazers:0Issues:0Issues:0