- Hamburg, Germany
- https://infosec.exchange/@einwickler
- @einwickler
Lists (2)
Sort Name ascending (A-Z)
Stars
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azur…
Suspicious is a powerful web application designed to help users submit and analyze emails, files, IP addresses, and URLs
CLI generator for Velociraptor offline collector
VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the pro…
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
Lightweight run-time level sandboxing for java
Scapy: the Python-based interactive packet manipulation program & library.
Nmap script to detect a Microsoft Exchange instance version with OWA enabled.
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
Community curated list of templates for the nuclei engine to find security vulnerabilities.
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Adversary simulation and Red teaming platform with AI
Ladon 911 for Cobalt Strike & Cracked Download,Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password/brute-force/psexec/atexec/sshexec/webshell/smbexec/netcat/…
一款长亭自研的完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID
RUPS is an acronym for Reading and Updating PDF Syntax. RUPS is a tool built on top of iText® that allows you to look inside a PDF document and browse the different PDF objects and content streams.
DLL and Injector for dumping UWP applications at run-time to bypass encrypted file system protection.
Automation and Scaling of Digital Forensics Tools
Install and Run Python Applications in Isolated Environments
Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)