Sh0ckFR / Infosec-Useful-StuffLinks
This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security
☆62Updated 3 years ago
Alternatives and similar repositories for Infosec-Useful-Stuff
Users that are interested in Infosec-Useful-Stuff are comparing it to the libraries listed below
Sorting:
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆176Updated 7 months ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆122Updated 6 years ago
- ☆54Updated 7 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Malware Analysis Tools☆31Updated 6 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- A collection of tools created for computer security research purposes.☆133Updated 5 years ago
- Commands used in Windows penetration tests☆55Updated last month
- A WLAN red team framework.☆154Updated last year
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- ☆101Updated last year
- Various scripts and codes☆85Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- PowerShell payload generator☆118Updated 4 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆113Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- List of red team resources☆99Updated 8 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 4 months ago
- ☆84Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Linux Persistence Toolkit☆72Updated 3 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆136Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- A repo to support the book☆110Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago