mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
  
  Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
GitHub
  
  GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
  Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. - mufeedvh/moonwalk
  Sh0ckFR/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Language: Python
#dll #infosec #library #red_team #red_team_engagement #red_team_tools #red_teaming #redteam #vulnerability
Stars: 124 Issues: 0 Forks: 22
https://github.com/Sh0ckFR/DLLirant
  
  DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Language: Python
#dll #infosec #library #red_team #red_team_engagement #red_team_tools #red_teaming #redteam #vulnerability
Stars: 124 Issues: 0 Forks: 22
https://github.com/Sh0ckFR/DLLirant
GitHub
  
  GitHub - Sh0ckFR/DLLirant: DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
  DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. - Sh0ckFR/DLLirant
  trickest/resolvers
The most exhaustive list of reliable DNS resolvers.
#brute_force #bug_bounty #cybersecurity #dns #infosec #network #pentesting #red_team #resolver #resolvers #security #security_tool
Stars: 68 Issues: 0 Forks: 5
https://github.com/trickest/resolvers
  
  The most exhaustive list of reliable DNS resolvers.
#brute_force #bug_bounty #cybersecurity #dns #infosec #network #pentesting #red_team #resolver #resolvers #security #security_tool
Stars: 68 Issues: 0 Forks: 5
https://github.com/trickest/resolvers
GitHub
  
  GitHub - trickest/resolvers: The most exhaustive list of reliable DNS resolvers.
  The most exhaustive list of reliable DNS resolvers. - trickest/resolvers
  Nwqda/CVE-2022-26134
[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)
Language: Python
#atlassian #atlassian_confluence #confluence #confluence_server #cve_2022_26134 #infosec #payloads #poc #rce #remote_code_execution #vulnerability
Stars: 118 Issues: 1 Forks: 39
https://github.com/Nwqda/CVE-2022-26134
[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)
Language: Python
#atlassian #atlassian_confluence #confluence #confluence_server #cve_2022_26134 #infosec #payloads #poc #rce #remote_code_execution #vulnerability
Stars: 118 Issues: 1 Forks: 39
https://github.com/Nwqda/CVE-2022-26134
👍2
  d4rckh/gorilla
tool for generating wordlists or extending an existing one using mutations.
Language: Rust
#cracking #hash #hashcat #infosec #johntheripper #security
Stars: 194 Issues: 1 Forks: 8
https://github.com/d4rckh/gorilla
  
  tool for generating wordlists or extending an existing one using mutations.
Language: Rust
#cracking #hash #hashcat #infosec #johntheripper #security
Stars: 194 Issues: 1 Forks: 8
https://github.com/d4rckh/gorilla
GitHub
  
  GitHub - d4rckh/gorilla: tool for generating wordlists or extending an existing one using mutations.
  tool for generating wordlists or extending an existing one using mutations. - d4rckh/gorilla
👍1🔥1💩1
  Idov31/Sandman
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Language: C#
#backdoor #csharp #cybersecurity #infosec #python #red_team #red_team_tools #redteam #windows
Stars: 120 Issues: 0 Forks: 16
https://github.com/Idov31/Sandman
  
  Sandman is a NTP based backdoor for red team engagements in hardened networks.
Language: C#
#backdoor #csharp #cybersecurity #infosec #python #red_team #red_team_tools #redteam #windows
Stars: 120 Issues: 0 Forks: 16
https://github.com/Idov31/Sandman
GitHub
  
  GitHub - Idov31/Sandman: Sandman is a NTP based backdoor for hardened networks.
  Sandman is a NTP based backdoor for hardened networks. - Idov31/Sandman
👍2🔥1
  Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
  
  PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
GitHub
  
  GitHub - Idov31/Cronos: PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
  PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. - Idov31/Cronos
👍2
  Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
  
  Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
GitHub
  
  GitHub - Idov31/Venom: Venom is a library that meant to perform evasive communication using stolen browser socket
  Venom is a library that meant to perform evasive communication using stolen browser socket - Idov31/Venom
👍4🕊3
  wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
  
  UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
GitHub
  
  GitHub - wh0amitz/KRBUACBypass: UAC Bypass By Abusing Kerberos Tickets
  UAC Bypass By Abusing Kerberos Tickets. Contribute to wh0amitz/KRBUACBypass development by creating an account on GitHub.
👍3
  fr0gger/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
#agents #cybersecurity #infosec #llm
Stars: 404 Issues: 1 Forks: 33
https://github.com/fr0gger/Awesome-GPT-Agents
  
  A curated list of GPT agents for cybersecurity
#agents #cybersecurity #infosec #llm
Stars: 404 Issues: 1 Forks: 33
https://github.com/fr0gger/Awesome-GPT-Agents
GitHub
  
  GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity
  A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.
  DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
  
  Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
GitHub
  
  GitHub - DosX-dev/Astral-PE: Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
  Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64) - DosX-dev/Astral-PE
👍1
  