Open Source and publicly modifiable knowledgebase about CyberSecurity Topics, Concepts, and Terminology. This replaces our prior repo which included basic install guides and tools.
☆26Jan 9, 2025Updated last year
Alternatives and similar repositories for KnowledgeBase
Users that are interested in KnowledgeBase are comparing it to the libraries listed below
Sorting:
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- Open-source Discord RAT (Remote Access Trojan) controlled directly from your own server.☆12Nov 24, 2024Updated last year
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆13May 24, 2021Updated 4 years ago
- PowerShell Cmdlets for wallpaper manipulation on Windows 10 x64☆10Nov 2, 2020Updated 5 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆46Jun 24, 2023Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Nov 3, 2019Updated 6 years ago
- Advanced Android and System Hacking Tool . This tool used for some Cyber Attacks in System This Tool used for educational purpose and Thi…☆34Apr 14, 2025Updated 10 months ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Files and Links from Go Hack Yourself book and course☆14Feb 11, 2026Updated 3 weeks ago
- Deepwood- is an easy-to-use, Python-based RAT & Stealer, which send info to your webhook. You can recover passwords, aplication data, dis…☆14May 20, 2024Updated last year
- Simple C# implementation of PowerUpSQL☆95Jul 8, 2024Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆114Dec 19, 2024Updated last year
- 个人笔记☆15Feb 26, 2026Updated last week
- ☆16Jun 15, 2025Updated 8 months ago
- Resources of knowledge and tools from and for the digital world.☆11Jul 15, 2022Updated 3 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- This application will monitor the smite mixer chat for chest codes and redeem them using the PC game client. See README for more info.☆13May 21, 2018Updated 7 years ago