TonyRode's starred repositories
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
DiscordChatExporter
Exports Discord chat logs to a file
spacebarchat
📬 Spacebar is a free open source selfhostable discord compatible communication platform
log4j-scan
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
static-binaries
Various *nix tools built as statically-linked binaries
kiterunner
Contextual Content Discovery Tool
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
BloodHound.py
A Python based ingestor for BloodHound
CVE-2021-1675
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
PetitPotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
ItWasAllADream
A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
ShadowCoerce
MS-FSRVP coercion abuse PoC
Log4j-RCE-Scanner
Remote command execution vulnerability scanner for Log4j.
Exegol-images
Docker images of the Exegol project
Exegol-resources
Hacking resources for the Exegol project
THC_BlueBorne
Projet long TLS-SEC pour la réalisation d'un challenge "tuto" lors de la Toulouse Hacking Convention. Exploitation de la faille Blueborne.