S3mprGumb1 / whodunnit
A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs
β16Updated 5 years ago
Related projects: β
- Shellcode / Buffer Overflow π£β18Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β26Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.β12Updated 8 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposesβ20Updated 3 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "filelesβ¦β10Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)β15Updated 10 years ago
- Work in Progress repoβ14Updated 5 years ago
- β15Updated this week
- A botnet (C&C) framework that create in bash and using crontab for periodic executeβ10Updated 7 years ago
- Collection of cracked malwareβ14Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teamingβ20Updated 4 years ago
- β10Updated this week
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 6 years ago
- Trying to take the dum-dum out of securityβ11Updated 7 years ago
- Exploit Research & Development - Ported Exploitsβ11Updated 7 years ago
- β22Updated this week
- Information Stealers Wall of Sheep (IS-WOS)β13Updated 3 years ago
- Phishing sites configured to work with Netlify form handlingβ12Updated 5 years ago
- Automated Payload Test Controllerβ9Updated 7 years ago
- Abuses Powershell Profilesβ13Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.β15Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 6 years ago
- This directory contains random scripts from threat hunting or malware researchβ10Updated 6 years ago
- Format string exploit generationβ9Updated 9 years ago
- A curated list of awesome malware analysis tools and resourcesβ14Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.β21Updated 6 years ago
- Local enumeration and exploitation framework.β18Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collectβ¦β17Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.β27Updated 5 years ago
- Oracle Attacks Toolβ13Updated 8 years ago