Lists (4)
Sort Name ascending (A-Z)
Stars
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
List of the links to the docs for different services, which explain using of advanced search operators
📚 Linux Electron Onenote - A Linux compatible version of OneNote
E-mails, subdomains and names Harvester - OSINT
An open-source time-series SQL database optimized for fast ingest and complex queries. Packaged as a PostgreSQL extension.
Platform independent Near Field Communication (NFC) library
Using sockets for something cool
A social networking Django application (similar to Twitter) written in Python, HTML, CSS & JavaScript.
Monitor linux processes without root permissions
403/401 Bypass Methods + Bash Automation + Your Support ;)
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
A list of public penetration test reports published by several consulting firms and academic security groups.
This is Visual C# code that will create a new user named "mcfatty" when run as a service.
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Veil 3.1.X (Check version info in Veil at runtime)
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, inst…
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Penetration Testing Student version 2 simple condensed NOTES for quick recap
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.