Sh0ckFR / Infosec-Useful-Stuff
This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security
☆55Updated 2 years ago
Alternatives and similar repositories for Infosec-Useful-Stuff:
Users that are interested in Infosec-Useful-Stuff are comparing it to the libraries listed below
- A shell script that mimics sudo and sends you back the password☆43Updated last year
- Malware vulnerability intel tool for third-party attackers☆115Updated 3 months ago
- Classic Web shell upload techniques & Web RCE techniques☆26Updated 2 months ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆35Updated last month
- Commands used in Windows penetration tests☆49Updated 3 years ago
- Tools that trigger False Positive AV alerts☆44Updated last month
- A VS Code extension to preview XML nmap output☆44Updated 11 months ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆59Updated 2 years ago
- Purpose-built Red Team network hardware implant made from common components.☆22Updated last year
- ☆48Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆107Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Some random tools I use for penetration testing☆87Updated last month
- Simple & Customizable DNS Data Exfiltrator☆107Updated last year
- LD_PRELOAD rootkit☆128Updated 11 months ago
- ☆23Updated 2 years ago
- Windows Keylogger in C++☆18Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆109Updated 3 years ago
- Ethical hacking, CTF, tools & etc☆21Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 9 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆79Updated 10 months ago
- ☆13Updated 4 years ago