Waqas Ali's repositories

metasploit-framework

Metasploit Framework

Language:RubyLicense:NOASSERTIONStargazers:2Issues:2Issues:0

AutoSploit

Automated Mass Exploiter

Language:PythonLicense:GPL-3.0Stargazers:1Issues:2Issues:0

Ambush

Ambush Host Intrusion Prevention System

Language:RubyLicense:NOASSERTIONStargazers:0Issues:2Issues:0

awesome-incident-response

A curated list of tools for incident response

License:Apache-2.0Stargazers:0Issues:2Issues:0

awesome-malware-analysis

A curated list of awesome malware analysis tools and resources

License:NOASSERTIONStargazers:0Issues:2Issues:0

azazel

Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection.

Language:CLicense:GPL-2.0Stargazers:0Issues:2Issues:0

chaskiq

A full featured Live Chat, Support & Marketing platform

Language:JavaScriptLicense:AGPL-3.0Stargazers:0Issues:1Issues:0

CrackMapExec

A swiss army knife for pentesting Windows/Active Directory environments

Language:PowerShellLicense:BSD-2-ClauseStargazers:0Issues:2Issues:0

demos

Demos of various techniques found in malware

Language:CStargazers:0Issues:2Issues:0

evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Language:GoLicense:GPL-3.0Stargazers:0Issues:1Issues:0

fido

Teaching old shellcode new tricks

Language:PythonStargazers:0Issues:2Issues:0

github-slideshow

A robot powered training repository :robot:

Language:HTMLLicense:MITStargazers:0Issues:1Issues:1

htrace.sh

Simple shell script to debugging http/https connection tracing, response headers and mixed-content. Scanning domain using Nmap NSE Library. Support external security tools: testssl.sh, Mozilla Observatory and SSL Labs API.

Language:ShellLicense:GPL-3.0Stargazers:0Issues:2Issues:0

icebreaker

Gets plaintext Active Directory credentials if you're on the internal network.

Language:PythonStargazers:0Issues:2Issues:0

nginx-sticky-module-ng

Forked from https://bitbucket.org/nginx-goodies/nginx-sticky-module-ng Community with option for sameSite

Language:CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

onionshare

Securely and anonymously share a file of any size

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

payloads

Git All the Payloads! A collection of web attack payloads.

Language:ShellLicense:GPL-3.0Stargazers:0Issues:2Issues:0

PowerSploit

PowerSploit - A PowerShell Post-Exploitation Framework

Language:PowerShellLicense:NOASSERTIONStargazers:0Issues:2Issues:0

pupy

Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in python. It features a all-in-memory execution guideline and leaves very low footprint. Pupy can communicate using various transports, migrate into processes (reflective injection), load remote python code, python packages and python C-extensions from memory.

Language:PythonLicense:NOASSERTIONStargazers:0Issues:2Issues:0

RubyFu

Rubyfu is where Ruby goes evil....

Language:CSSStargazers:0Issues:2Issues:0

SCARY

PHP Source Code Analyzer written in Perl (taint checking)

Language:PerlStargazers:0Issues:2Issues:0

tactical-exploitation

Modern tactical exploitation toolkit.

Language:PythonLicense:MITStargazers:0Issues:2Issues:0

Veil

Veil is a tool used to generate payloads that bypass antivirus solutions

Language:PythonLicense:NOASSERTIONStargazers:0Issues:2Issues:0

WebSiren

To improve the usability of developing and deploying WAF (Web Application Firewall) rules, we have proposed and developed a WebSiren which is a rule development tool which allows you to manage, search, analyze, translate and classify firewall rules. The developed application allow user to create new rules, edit existing rules and deleting specific rules from a rule set. It provides translation for mod security rules to Semantic rule representation and semantic rules to mod security rules. Rule Explorer also provides functionality to manage rule groups so that user can classify a certain set of rules into a group such as a user might want to manage a group of rules for XSS attacks. It also allow user to search a set of rules on the bases of specified criteria.

Language:JavaStargazers:0Issues:2Issues:0

wordpress-exploit-framework

A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.

Language:RubyLicense:GPL-3.0Stargazers:0Issues:2Issues:0

yara

The pattern matching swiss knife

Language:CLicense:Apache-2.0Stargazers:0Issues:2Issues:0