Sh0ckFR / Infosec-Useful-StuffLinks
This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security
☆64Updated 3 years ago
Alternatives and similar repositories for Infosec-Useful-Stuff
Users that are interested in Infosec-Useful-Stuff are comparing it to the libraries listed below
Sorting:
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated 9 months ago
- A collection of tools created for computer security research purposes.☆135Updated 5 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- ☆54Updated 7 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- A WLAN red team framework.☆155Updated this week
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆45Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Rodan Exploitation Framework☆103Updated last month
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆134Updated last week
- Open-Source Collection of Social Engineering Pretexts☆142Updated 2 years ago
- Malware Analysis Tools☆31Updated 6 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- ☆101Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆127Updated 6 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- LD_PRELOAD rootkit☆137Updated last year
- Hunting for passwords with deep learning☆235Updated last year
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- PowerShell payload generator☆120Updated 4 years ago
- Basic C2 Server☆193Updated 4 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated 2 years ago
- Extract credentials and other useful info from network captures☆76Updated 3 years ago
- ☆102Updated 6 years ago