D00MFist / security
Notes and Commands for CTFs
☆19Updated 4 years ago
Alternatives and similar repositories for security:
Users that are interested in security are comparing it to the libraries listed below
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆14Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 7 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 9 months ago
- A python approach to interacting with web shells.☆29Updated 4 years ago
- Scripts and One-Liners☆20Updated 2 weeks ago
- ☆34Updated 6 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Pentesting notes☆17Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Field guide to gather low-hanging fruits☆13Updated 10 months ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- ☆23Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 3 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- ☆28Updated last year