Git Product home page Git Product logo

Justin Forbes's Projects

pefixup icon pefixup

PE File Blessing - To continue or not to continue

penetration-testing-tools icon penetration-testing-tools

A collection of more than 160+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.

perfusion icon perfusion

Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)

persistencesniper icon persistencesniper

Powershell script that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.

petitpotam icon petitpotam

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

pezor icon pezor

Open-Source Shellcode & PE Packer

php-shell-detector icon php-shell-detector

Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells” signature database that helps to identify “web shell” up to 99%.

pimp-my-shell icon pimp-my-shell

go program that installs and customizes ohmyzsh tmux vim via various plugins and other nice to haves

powercat icon powercat

netshell features all in version 2 powershell

powerhub icon powerhub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

ppfuzz icon ppfuzz

A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀

ppldump icon ppldump

Dump the memory of a PPL with a userland exploit

pr0cess icon pr0cess

some gadgets about windows process and ready to use :)

pret icon pret

Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.

pretender icon pretender

Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.

privilege-escalation icon privilege-escalation

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.