willyuninfosec's repositories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
at-ps
Adversary Tactics - PowerShell Training
AwesomePentestingResources
A list of resources that I built up over the past few years in Cyber Security
BashScripts
My own personal bash scripts that revolutionize my life!!
Brute-Force-Login
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Cheatsheets
Some useful commands, links and tools for pentest
checksec.sh
Checksec.sh
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
faisalfs10x.github.io
My InfoSec blog is at https://faisalfs10x.github.io/
How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.
IoTGoat
IoTGoat is a deliberately insecure firmware based on OpenWrt.
Kansa
A Powershell incident response framework
lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
monkey
Infection Monkey - An automated pentest tool
nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
overflow
A command-line tool for exploiting OSCP-style buffer overflow vulnerabilities.
PeaceMaker
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.
pentest
Full-automated dynamic vulnerability scanning tool for Ruby on Rails project
Posh-SecMod
PowerShell Module with Security cmdlets for security work
PowerShellArsenal
A PowerShell Module Dedicated to Reverse Engineering
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
pwk
Penetration with Kali Linux
RubyFu
Rubyfu, where Ruby goes evil!
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
stella
Stella is a collection of tools, libraries and a framework for command line application. It supports Nix (including MacOS) and Windows platform, and provide usefull tools and functions for bash and batch application. Including a package manager, deploy tools and more.
UACME
Defeating Windows User Account Control