Git Product home page Git Product logo

titounkle's Projects

gau icon gau

Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

ghostshell icon ghostshell

Malware indetectable, with AV bypass techniques, anti-disassembly, etc.

goddi icon goddi

goddi (go dump domain info) dumps Active Directory domain information

group3r icon group3r

Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.

harpoon icon harpoon

A collection post-exploitation scripts for determining if that shell you just got is in a container, what kind, and ways to escape.

hoaxshell icon hoaxshell

An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.

homepwn icon homepwn

HomePwn - Swiss Army Knife for Pentesting of IoT Devices

http-desync-guardian icon http-desync-guardian

Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).

http-revshell icon http-revshell

Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware

idaprodesde0 icon idaprodesde0

Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info

imhex icon imhex

A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.

ios_15_rce icon ios_15_rce

Remote Code Execution V1 For iOS 15 sent through airdrop after the device was connected to a trusted host

itssoeasy icon itssoeasy

A Linux/Windows Ransomware PoC written in Python, Go and C

itwasalladream icon itwasalladream

A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE

juicy-potato icon juicy-potato

A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.

juumla icon juumla

🦁 Juumla is a python tool designed to identify Joomla version, scan for vulnerabilities and search for config files.

kaiten icon kaiten

A Undetectable Payload Generation

learnjavabug icon learnjavabug

Java安全相关的漏洞和技术demo,其中包括原生Java、Fastjson、Jackson、Hessian2以及XML反序列化漏洞利用和Dubbo(Hessian2反序列化)、Shiro(PaddingOracleCBC)等框架的exploits,并且还有Java Security Manager绕过、Dubbo-Hessian2安全加固等等实践代码。

libros icon libros

Libros y documentación propia desarrollada durante investigaciones

ligolo icon ligolo

Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.