Stars
8 Lessons, Kick-start Your Cybersecurity Learning.
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
A complete secure access control and alarm panel system using ESP32 modules, including firmware, management back end, and PCB and case designs.
Tool to dump cisco device configs via snmp and/or add new users
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose files, issue tracking, and documentation
armuk / unfetter
Forked from unfetter-discover/unfetterThe main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose files, issue tracking, and documentation
An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.
Directory/File, DNS and VHost busting tool written in Go
Crankshaft: A turnkey GNU/Linux solution that transforms a Raspberry Pi to an Android Auto head unit.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelistin…
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team…
Scans an internal network using massscan and nmap
An open source encryption program that uses the "one-time pad" method.
VBA Obfuscation Tools combined with an MS office document generator
Emulating Virtual Environment to stay protected against advanced malware
SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers
fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols
The front-end of the app to use for wedding invitations.
The open-source code for my wedding website
A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads.
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powe…
armuk / netboot
Forked from danderson/netbootPackages and utilities for network booting