weev3's repositories
homebrew-pentest
Homebrew Tap - Pen Test Tools
0day-security-software-vulnerability-analysis-technology
0day安全_软件漏洞分析技术
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
APTSimulator
A toolset to make a system look as if it was the victim of an APT attack
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
Checklists
Pentesting checklists for various engagements
ctf-tools
Some setup scripts for security research tools.
DigiSpark-Scripts
USB Rubber Ducky type scripts written for the DigiSpark.
Invoke-Obfuscation
PowerShell Obfuscator
mimikatz
A little tool to play with Windows security
nishang
Nishang - PowerShell for penetration testing and offensive security.
OSCE
Collection of things made during my preparation to take on OSCE
oscp
oscp study
OSCP-1
Collection of things made during my OSCP journey
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PHP-vulnerability-audit-cheatsheet
This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabilities you generally find with that function.
PowerDNS
PowerDNS: Powershell DNS Delivery
PowerShell-Suite
My musings with PowerShell
PSReflect
Easily define in-memory enums, structs, and Win32 functions in PowerShell
SysmonTools
Utilities for Sysmon
the-backdoor-factory
Patch PE, ELF, Mach-O binaries with shellcode (NOT Supported)
unix-privesc-check
Automatically exported from code.google.com/p/unix-privesc-check
Veil
Veil 3.1.X (Check version info in Veil at runtime)
whoami-priv
Slides from my talk "whoami /priv" at Romhack 2018
windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
windows-privesc-check
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
WMImplant
This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.