weev3's repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
ATTACK-Tools
Utilities for MITRE™ ATT&CK
awesome-honeypots
an awesome list of honeypot resources
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
calc_security_poc
A sample of proof of concept scripts that run Calc.exe with full source code.
CompSecAttackLabs
Contains Attack labs
DeserLab
Java deserialization exploitation lab.
DetectionLab
Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
fuzzer
A Python interface to AFL, allowing for easy injection of testcases and other functionality.
helpful-recon-data
This information provides helpful information to make it easier to discover new attack surface on HackerOne.com.
how2heap
A repository for learning various heap exploitation techniques.
LogViewer
LogViewer for viewing and searching large text files...
lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
MS17-010
MS17-010
osquery-attck
Mapping the MITRE ATT&CK Matrix with Osquery
OSWE
OSWE Preparation
pentest
:no_entry: offsec batteries included
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
practical-recon-levelup0x02
This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd LevelUp 0x02 virtual conference
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
reverse-shell
Reverse Shell as a Service
sentinel-attack
Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework
SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Shared
Shared Blogs and Notebooks
sysmon-dfir
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.