VISHNU RAJU's repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
awesome-threat-detection
A curated list of awesome threat detection and hunting resources
Binaries-for-Red-Team
statically linked binary used in Red Team assignments
cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Enum-LSASS
LSASS enumeration like pypykatz written in C-Lang
express
Fast, unopinionated, minimalist web framework for node.
google_dork_list
Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google Dorks. A collection of around 10,000 Dorks. Author: Jolanda de Koff
Handy-Scripts
Scripts that comes handy in dealing with VA and pentest reports
libprocesshider
Hide a process under Linux using the ld preloader (https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/)
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
Mapping-Injection
Just another Windows Process Injection
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
peirates
Peirates - Kubernetes Penetration Testing tool
SILENTTRINITY
A post-exploitation agent powered by Python, IronPython, C#/.NET
stratus-red-team
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
UltimateWDACBypassList
A centralized resource for previously documented WDAC bypass techniques
VXUG-Papers
Research code & papers from members of vx-underground.