Watson's repositories
0xsp-Mongoose
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
awesome-yara
A curated list of awesome YARA rules, tools, and people.
cleverhans
An adversarial example library for constructing attacks, building defenses, and benchmarking both
deep-pwning
Metasploit for machine learning.
DeepPass
Hunting for passwords with deep learning
DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
dns-black-cat
Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands in shell mode over DNS protocol
DynamicSyscalls
DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)
esp32-wifi-penetration-tool
Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.
localGPT
Chat with your documents on your local device using GPT models. No data leaves your device and 100% private.
MAIR
PyTorch implementation of adversarial defenses [Fantastic Robustness Measures: The Secrets of Robust Generalization, NeurIPS 2023].
Marble
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.
metasploit-framework
Metasploit Framework
Miner
Local Privilege Escalation Miner
Nemesis
An offensive data enrichment pipeline
octopwnweb
OctoPwn in your browser
Pentest-Cheat-Sheets
A collection of snippets of codes and commands to make your life easier!
PlumHound
Bloodhound for Blue and Purple Teams
PNG-IDAT-Payload-Generator
Generate a PNG with a payload embedded in the IDAT chunk (Based off of previous concepts and code -- credit in README)
pwndrop
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
rules
Repository of yara rules
sharem
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
SharpLink
Create file system symbolic links from low privileged user accounts within PowerShell
shellnoob
A shellcode writing toolkit
Shhhloader
Syscall Shellcode Loader (Work in Progress)
simple-salesforce
A very simple Salesforce.com REST API client for Python