Stars
real time face swap and one-click video deepfake with only a single image
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Grab your own sweet-looking '.is-a.dev' subdomain.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Tools and Techniques for Red Team / Penetration Testing
A tool which is uses to remove Windows Defender in Windows 8.x, Windows 10 (every version) and Windows 11.
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Cameradar hacks its way into RTSP videosurveillance cameras
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
Identifies the bytes that Microsoft Defender flags on.
Stealing Signatures and Making One Invalid Signature at a Time
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
Organized list of my malware development resources
Module to compile powershell scripts to executables
Compiled Binaries for Ghostpack
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux