Lists (2)
Sort Name descending (Z-A)
Stars
Awesome list of keywords and artifacts for Threat Hunting sessions
A repository of sysmon configuration modules
For radio frequency research ( RF attack ) this script can cause severe damage to an individual's privacy ( trust-attack ) by enabling attackers to intercept, modify, or disrupt communication betwe…
Automated Exploit scanners for public Cameras, CCTV's, Devices Cam, Etc. Exploitation tool, Trust Attacks.
CrypeAlbatros is a handy SMB enumeration tool. An Offensive tool to Scan & Exploit vulnerabilities in Microsoft Windows over the Samba protocol.
Tool to identify routers on the local LAN and paths to the Internet
Choreo Reading List Sample Application
Competitive Programming & System Design Resources.
This repository consists of the code samples, assignments, and notes for the DevOps bootcamp of WeMakeDevs.
kunal-kushwaha / students
Forked from cncf/studentsCNCF resource for students looking to get into the cloud native community
This repository consists of the code samples, assignments, and notes for the Java data structures & algorithms + interview preparation bootcamp of WeMakeDevs.
Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result in user accounts being suspended. Therefore, the attackers s…
Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of 𝗧𝗲𝗲𝘁𝗵 cybertooth && 𝗝𝗼𝗵𝗻 the Ripper. Fastest and most advanced password and logon cracking.…
TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. Penetrate a strong system such as Windows, MacOS, Android, a…
byt3n33dl3 / BreedHoundAD
Forked from BloodHoundAD/SharpHoundData and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current user belongs to. ( BOF.NET )
Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.
Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on m…
CarpaAlko is a notorious Smartphones Malware family, known for its Remote Administration & Access Tools, which include remote Device control and advanced Spyware functions like keylogging, gesture …
Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.
Apple iD & Credentials BruteForcer. iCloud Apple ID Dictionary Attack that Bypasses Account Lockout restrictions and Secondary Authentication.
Enhance swiss army knife, for penetration testing networks. Kerberos attacks and passwords spraying. Additionally, a database is used to store used & dumped credentals for Administrator and user At…
AD Authentication. Kerberos Attacks with ACL abuse capabilities. This CLI tool supports an attackers to perfrom a Kerberos Attacks and NTLM Relay Attacks
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threa…