Git Product home page Git Product logo

Nik's Projects

crackdb icon crackdb

Unsalted password hash lookup utility

cracklord icon cracklord

Queue and resource system for cracking passwords

htsnapp icon htsnapp

Take screenshot of web services within the network

impacket icon impacket

Automatically exported from code.google.com/p/impacket

impdump icon impdump

This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.dit databases.

keimpx icon keimpx

Check for valid credentials across a network over SMB

linenum icon linenum

Scripted Local Linux Enumeration & Privilege Escalation Checks

meterssh icon meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.

mhn icon mhn

Modern Honey Network

nishang icon nishang

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during penetration tests.

padbuster icon padbuster

Automated script for performing Padding Oracle attacks

pentest icon pentest

List of scripts I created or found on the Internet that would aid in pentesting

powershell-scripts icon powershell-scripts

List of PowerShell scripts conjured up for my consumption (you are welcome to use)

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

powertools icon powertools

Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.

prowler icon prowler

AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and additional checks. Official CIS for AWS guide: https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf

seclists icon seclists

SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.

sqlmap icon sqlmap

Automatic SQL injection and database takeover tool

veil-evasion icon veil-evasion

Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.