Lists (12)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- Bicep
- C
- C#
- C++
- CMake
- CSS
- Common Lisp
- Crystal
- Dockerfile
- Elixir
- Go
- Groovy
- 8000 HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Lua
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- Svelte
- Swift
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- YAML
- YARA
- Zig
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
A New Approach to Directory Bruteforce with WaybackLister v1.0
Beacon Object File (BOF) to obtain Entra tokens via authcode flow.
Exercise writeups from the book Practical Malware Analysis.
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
The Security Toolkit for LLM Interactions
Collection of knowledge about information security
BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potential security holes.
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Fl…
Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.
Cobalt Strike HTTPS beaconing over Microsoft Graph API
A sample of C++ version Chrome native messaging host
SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.
This code shows how to silently install Web Store extensions on Google Chrome on MacOS
Noriben - Portable, Simple, Malware Analysis Sandbox
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques implemented by malicious documents.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.
Small utility to chunk up a large BloodHound JSON file into smaller files for importing.
PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirectory module (ADWS) or System.DirectoryServices class (LDAP).