tree-chtsec's repositories

Language:PythonStargazers:33Issues:0Issues:0
Language:PowerShellStargazers:28Issues:1Issues:0
Language:JavaStargazers:3Issues:0Issues:0

BlogEngine.NET

Multi-User ASP.NET Blogging Application

Language:C#Stargazers:0Issues:0Issues:0

Chisel-Strike

A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.

Language:C#License:GPL-3.0Stargazers:0Issues:0Issues:0

DcRat

A simple remote tool written in C#. 一个简单的c#远控

Language:C#License:MITStargazers:0Issues:0Issues:0

docker-javafx

Docker image with javafx

Language:DockerfileLicense:MITStargazers:0Issues:0Issues:0

DotNetToJScript

A tool to create a JScript file which loads a .NET v2 assembly from memory.

License:GPL-3.0Stargazers:0Issues:0Issues:0
Language:JavaStargazers:0Issues:0Issues:0

firmware-analysis-toolkit

Toolkit to emulate firmware and analyse it for security vulnerabilities

Language:PythonLicense:MITStargazers:0Issues:0Issues:0
Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

Havoc

The Havoc Framework.

License:GPL-3.0Stargazers:0Issues:0Issues:0

house

A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

JavaApplet

These are from Offensive Security. This is for study Client-Side Attack with JavaApplet. A good example of a client side exploit based on a human vulnerability, as opposed to a software vulnerability, is the JavaApplet client side attack. This attack affects targets with Java installed and enabled in their browsers – a required feature for many administrators and power users. As JavaLenabled browsers can run Java applications, it is quite trivial to make our own malicious Java applet which will execute code of our choosing when run. However, there is one drawback: the user will get a warning box before execution of our Java payload. The average user may not understand the implications of clicking Run on this warning box. If the user runs the program, the Java software installed on the victim’s machine will execute our payload happily.!! The Java code below will download a given executable and execute it in a temporary directory on the target machine. But, you need to edit IP address in the program

Stargazers:0Issues:0Issues:0

MicroBackdoor

Small and convenient C2 tool for Windows targets

License:GPL-3.0Stargazers:0Issues:0Issues:0

MiniDump

C# Lsass parser

Language:C#Stargazers:0Issues:0Issues:0

mitre_attack_csv

MITRE ATT&CK in CSV form

Language:PythonStargazers:0Issues:0Issues:0

python-fortify

Read and write Fortify Project (FPR) files in Python

Language:PythonStargazers:0Issues:0Issues:0

rengine

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with mi

Language:JavaScriptLicense:GPL-3.0Stargazers:0Issues:0Issues:0

SharpAgent

C# havoc implant

Language:PowerShellStargazers:0Issues:0Issues:0

SharpShooter

Payload Generation Framework

Language:Visual BasicStargazers:0Issues:0Issues:0

sqlmap

Automatic SQL injection and database takeover tool

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Vulnerable-OAuth-2.0-Applications

vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.

Language:JavaScriptStargazers:0Issues:0Issues:0