Lists (11)
Sort Name ascending (A-Z)
Starred repositories
Program for determining types of files for Windows, Linux and MacOS.
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
A Modern Framework for Bug Bounty Hunting
Generate queries from graphql schema, used for writing api test.
CA Optics - Azure AD Conditional Access Gap Analyzer
The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential digital evidence and conduct triage/analysis of such evidence.
Binary patching examples tutorial with dynamic instrumentation and traditional methods with a debugger.