Sh0ckFR / Infosec-Useful-Stuff
This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security
☆56Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Infosec-Useful-Stuff
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆108Updated 3 years ago
- Commands used in Windows penetration tests☆49Updated 2 years ago
- A shell script that mimics sudo and sends you back the password☆42Updated last year
- ☆49Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Malware vulnerability intel tool for third-party attackers☆113Updated last month
- ☆37Updated 3 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆51Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆52Updated 2 years ago
- Python, C++ and Go☆22Updated 2 years ago
- ☆34Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- Some random tools I use for penetration testing☆83Updated last month
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Tools that trigger False Positive AV alerts☆43Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- ☆51Updated 6 years ago
- ☆17Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- ☆22Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated last month
- Vulnerabilities, exploits, and PoCs☆34Updated 2 months ago
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆24Updated 3 years ago
- Self-healing RAT utilizing libp2p☆86Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 10 months ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year