A.'s starred repositories

CobaltStrike

CobaltStrike相关内容

Stargazers:27Issues:0Issues:0

Ninja

Open source C2 server created for stealth red team operations

Language:PowerShellStargazers:765Issues:0Issues:0

DeimosC2

DeimosC2 is a Golang command and control framework for post-exploitation.

Language:VueLicense:MITStargazers:1084Issues:0Issues:0

cobalt-arsenal

My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

Language:PowerShellLicense:MITStargazers:1011Issues:0Issues:0

Shellcode-Via-HTA

How To Execute Shellcode via HTA

Language:JavaScriptLicense:BSD-3-ClauseStargazers:136Issues:0Issues:0

morphHTA

morphHTA - Morphing Cobalt Strike's evil.HTA

Language:PythonStargazers:516Issues:0Issues:0
Language:PythonLicense:Apache-2.0Stargazers:2125Issues:0Issues:0

CRLF-one-liner

A simple Bash one liner with aim to automate CRLF vulnerability scanning.

Stargazers:66Issues:0Issues:0

Bug-Bounty-Scripts

The scripts I write to help me on my bug bounty hunting

Language:LuaLicense:GPL-3.0Stargazers:116Issues:0Issues:0

Wies

Wies is a bash script that automates the recon steps for bug bounty.

Language:ShellStargazers:5Issues:0Issues:0

kali-bounty

Kali image used for bug bounty

Language:ShellStargazers:3Issues:0Issues:0

SubEnum

bash script for Subdomain Enumeration

Language:ShellStargazers:296Issues:0Issues:0

asnrecon

ASN reconnaissance script

Language:PythonLicense:Apache-2.0Stargazers:118Issues:0Issues:0

rengine

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.

Language:HTMLLicense:GPL-3.0Stargazers:7248Issues:0Issues:0

CWFF

Create your Custom Wordlist For Fuzzing

Language:PythonStargazers:184Issues:0Issues:0

Empire

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Language:PowerShellLicense:BSD-3-ClauseStargazers:4090Issues:0Issues:0

Empire-GUI

Empire client application

Language:JavaScriptLicense:MITStargazers:487Issues:0Issues:0

Covenant

Covenant is a collaborative .NET C2 framework for red teamers.

Language:C#License:GPL-3.0Stargazers:4083Issues:0Issues:0
License:MITStargazers:6Issues:0Issues:0

pentesting-dockerfiles

Pentesting/Bugbounty Dockerfiles.

Language:DockerfileStargazers:173Issues:0Issues:0

Wordlists

Various Payload wordlists

Stargazers:234Issues:0Issues:0

ligolo

Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/

Language:GoLicense:GPL-3.0Stargazers:1692Issues:0Issues:0

Redcloud

Automated Red Team Infrastructure deployement using Docker

Language:PythonLicense:MITStargazers:1193Issues:0Issues:0

houndsploit

An advanced graphical search engine for Exploit-DB

Language:PythonLicense:BSD-3-ClauseStargazers:116Issues:0Issues:0

Cheatsheet-God

Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet

Stargazers:4811Issues:0Issues:0

CVE-2019-12840_POC

PoC for Webmin Package Update Authenticated Remote Command Execution

Language:PythonStargazers:5Issues:0Issues:0

server-status_PWN

A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-status instances.

Language:PythonLicense:MITStargazers:417Issues:0Issues:0

merlin

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Language:GoLicense:GPL-3.0Stargazers:5003Issues:0Issues:0

LKWA

Lesser Known Web Attack Lab

Language:CSSStargazers:327Issues:0Issues:0

SILENTTRINITY

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

Language:BooLicense:GPL-3.0Stargazers:2161Issues:0Issues:0