Last active
May 20, 2019 23:57
-
-
Save kellthenoise/6c614363be23e1c0adc280aafff31f06 to your computer and use it in GitHub Desktop.
Github Pages
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
External <br> | |
* [[https://github.com/lgandx/Responder.git | |
* [[https://github.com/quickbreach/SMBetray.git[SMB Betrayu] | |
* [[https://github.com/yamakira/censys-enumeration|censys enumeration via certificates]] | |
* [[https://github.com/FortyNorthSecurity/EyeWitness.git|Eyewitness]] | |
* [[https://github.com/michenriksen/gitrob.git|gitrob git]] | |
* [[https://github.com/aboul3la/Sublist3r.git|Sublistr]] | |
* https://github.com/OJ/gobuster.git - directory brute forcing | |
Phishing | |
* [[https://github.com/threatexpress/domainhunter.git|domain hunter]] | |
* [[https://github.com/SimplySecurity/SimplyEmail.git|earching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.)]] | |
* [[https://github.com/SimplySecurity/SimplyEmail.git|Email recon made fast and easy, with a framework to build o]] | |
* [[https://github.com/mdsecactivebreach/Chameleon.git|chameleon]] | |
* [[https://github.com/deepzec/Bad-Pdf.git|Bad PDF - malicious file creation from ntlm]] | |
* [[https://github.com/invokethreatguy/C2Kv2/blob/master/c2k.sh|c2 infastructure automation]] | |
* [[https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki]] | |
Internal | |
* [[https://github.com/maaaaz/impacket-examples-windows|Impacket for windows]] | |
* [[https://github.com/HarmJ0y/ASREPRoast.git|Kerberoast]] | |
* https://github.com/DanMcInerney/icebreaker.git | |
Firmware / RE | |
* [[https://github.com/ReFirmLabs/binwalk.git|Binwalk]] | |
* [[https://github.com/threat9/routersploit.git|routersploit]] | |
* [[https://github.com/unicorn-engine/unicorn]] CPU Emulator - (ARM, AArch64, M68K, Mips, Sparc, X86) | |
* [[https://github.com/craigz28/firmwalker]] firmwalkerf]] | |
* [[https://github.com/radare/radare2.git|radare2]] | |
* [[https://github.com/radareorg/r2con2018/blob/master/talks/unpacking/Unpacking-a-Non-Unpackables.pdf | |
* [[https://i.blackhat.com/us-18/Wed-August-8/us-18-Rousseau-Finding-Xori-Malware-Analysis-Triage-With-Automated-Disassembly.pdf]] | |
* [[http://www.whitelist1.com/2017/05/9-analysis-with-radare2-of-mips.html ]] | |
https://github.com/fireeye/rvmi/tree/master/kvm-rvmi-kmod | |
https://digital-forensics.sans.org/blog/2009/05/15/strings-strings-are-wonderful-things | |
Physical | |
WASA | |
* https://github.com/BuffaloWill/oxml_xxe | |
*[[https://github.com/1N3/IntruderPayloads.git|Intruder payloads]] | |
Cloud | |
* https://github.com/alestic/lambdash | |
* #Remote Memory Acquisition Tool https://www.threatresponse.cloud | |
* [Maria Shotgun](https://github.com/ThreatResponse/margaritashotgun) | |
* [Python Lamba Inspector](https://github.com/ThreatResponse/python-lambda-inspector) | |
* [Vulnerable Azure](https://github.com/ThreatResponse/serverless-vulnerable-azure) | |
* https://github.com/ThreatResponse/csharp-lambda-inspector[C# Lamba Inspector] | |
* https://gist.github.com/andrewkrug/db4cea565c7adc144b30c3d3c55b6d89[Sample AWS Profiler] | |
* https://github.com/projectkudu/kudu[Azure sandbox] | |
* https://github.com/auth0/webtask-runtime.git[Webtask] | |
* https://gist.github.com/gdestuynder/b2a785f0d7208d73cce35460ca8dee1a[Web task breakout] | |
Random | |
*{{{[[git clone https://github.com/killswitch-GUI/zlib_wrapper.git|logging]]}}} | |
* [[https://github.com/trustedsec/hate_crack.git]] | |
* https://github.com/its-a-feature/Apfell.git - MacOS c2 | |
* [[ Python api for CS - https://github.com/dcsync/pycobalt.git | |
* https://github.com/infosecn1nja/AD-Attack-Defense | |
* https://github.com/Proxmark/proxmark3 | |
Lab setup | |
* [[ https://blogs.technet.microsoft.com/askpfeplat/2014/02/09/how-to-use-the-active-directory-performance-testing-tool-on-windows-server-2012/ | |
* [[ https://adsecurity.org/?p=2653 | |
Docker | |
https://github.com/docker/docker-bench-security | |
vuln scanning - https://github.com/anchore/anchore-engine | |
security patches - https://github.com/salesforce/dockerfile-image-update | |
Kubernetes | |
https://falco.org/docs/installation/ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment