Need help with Resource-List?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

FuzzySecurity
214 Stars 78 Forks 23 Commits 0 Opened issues

Description

GitHub Project Resource List

Services available

!
?

Need anything else?

Contributors list

Resource-List

A collection of useful GitHub projects loosely categorised. I may end up adding non-GitHub projects + KB-style links for topics.

pwnd

  • ODAT Oracle Database Attack Tool:

    • https://github.com/quentinhardy/odat
  • clusterd framework, attacking JBoss, CF, WebLogic, Tomcat, Railo, Axis2, Glassfish:

    • https://github.com/hatRiot/clusterd
  • JexBoss - Jboss verify and EXploitation Tool:

    • https://github.com/joaomatosf/jexboss
  • The Backdoor Factory Proxy (BDFProxy):

    • https://github.com/secretsquirrel/BDFProxy
  • impacket:

    • https://github.com/CoreSecurity/impacket
  • CrackMapExec Windows/Active Directory swiss army knife:

    • https://github.com/byt3bl33d3r/CrackMapExec
  • commix:

    • https://github.com/stasinopoulos/commix
  • beef-drive, beef framework with WebRTC:

    • https://github.com/tsu-iscd/beef-drive
  • VirtuaPlant Industrial Control Systems simulator:

    • https://github.com/jseidl/virtuaplant
  • Responder, LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication:

    • https://github.com/SpiderLabs/Responder
  • WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections:

    • https://github.com/ctxis/wsuspect-proxy
  • Potato, NTLM relay PrivEsc:

    • https://github.com/foxglovesec/Potato
  • jdwp-shellifier (Java Debug Wire Protocol):

    • https://github.com/stufus/jdwp-shellifier
  • foxglovesec JavaUnserializeExploits:

    • https://github.com/foxglovesec/JavaUnserializeExploits
  • KeeFarce, extraction of KeePass 2.x password database information from memory:

    • https://github.com/denandz/KeeFarce
  • Wolves Among the Sheep, MD5 hash collision:

    • https://github.com/silentsignal/sheep-wolf/
  • TDL (Turla Driver Loader). Driver loader for bypassing Windows x64 Driver Signature Enforcement:

    • https://github.com/hfiref0x/TDL
  • Ebowla, framework for Making Environmental Keyed Payloads:

    • https://github.com/Genetic-Malware/Ebowla
  • CVE-2016-1287 POC: IKEv1/v2 buffer overflow

    • https://github.com/exodusintel/disclosures/blob/master/CVE20161287_PoC
  • SubTee, AllTheThings -> Includes 5 Known Application Whitelisting Bypass Techniques in One File:

    • https://github.com/subTee/AllTheThings
  • IAT_POC, IAT based payload, that bypasses DEP/ASLR protections in EMET:

    • https://github.com/ShellcodeSmuggler/IAT_POC
  • XRulez, Windows executable that can add malicious rules to Outlook:

    • https://github.com/mwrlabs/XRulez

PowerShell

  • BloodHound, Six Degrees of Domain Admin:

    • https://github.com/adaptivethreat/Bloodhound
  • PowerSploit - A PowerShell Post-Exploitation Framework:

    • https://github.com/PowerShellMafia/PowerSploit
  • PowerShellArsenal, PowerShell Module Dedicated to Reverse Engineering:

    • https://github.com/mattifestation/PowerShellArsenal
  • Empire, post-exploitation framework:

    • https://github.com/powershellempire/empire
  • PowerShell Empire Web Interface using the REST API interface:

    • https://github.com/interference-security/empire-web
  • PowerShell live disk forensics platform:

    • https://github.com/Invoke-IR/PowerForensics
  • PowerMemory:

    • https://github.com/giMini/PowerMemory
  • KeeThief, methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory:

    • https://github.com/adaptivethreat/KeeThief
  • mimikittenz, a post-exploitation powershell tool for extracting juicy info from memory:

    • https://github.com/putterpanda/mimikittenz
  • Inveigh, LLMNR/NBNS spoofer/man-in-the-middle tool:

    • https://github.com/Kevin-Robertson/Inveigh
  • PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server:

    • https://github.com/NetSPI/PowerUpSQL
  • PoshPrivilege, add/remove privileges to an account/group on a local machine as well as enabling or disabling existing privileges which are applied to a current user's process token:

    • https://github.com/proxb/PoshPrivilege
  • Tater, PowerShell implementation of Hot Potato PrivEsc:

    • https://github.com/Kevin-Robertson/Tater
  • Powershell to CodeExecution and ProcessInjection:

    • https://github.com/3gstudent/Code-Execution-and-Process-Injection
  • PoshRat, PowerShell Reverse HTTP(s) Shell:

    • https://github.com/subTee/PoshRat
  • p0wnedShell, PowerShell Runspace Post Exploitation Toolkit:

    • https://github.com/Cn33liz/p0wnedShell
  • PSAttack, a portable console aimed at making pentesting with PowerShell a little easier:

    • https://github.com/jaredhaight/PSAttack
  • OutlookPersistence:

    • https://github.com/enigma0x3/OutlookPersistence
  • Babadook: Connection-less Powershell Persistent and Resilient Backdoor

    • https://github.com/jseidl/Babadook
    • https://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/
  • ps1-toolkit, obfuscated penetration testing PowerShell scripts:

    • https://github.com/vysec/ps1-toolkit
  • Windows 10 hardening:

    • https://gist.github.com/alirobe/7f3b34ad89a159e6daa1

CTF

  • CTF-Workshop:

    • https://github.com/kablaa/CTF-Workshop
  • ctf-tools:

    • https://github.com/zardus/ctf-tools
  • Mechanical Phish framework for the DARPA Cyber Grand Challenge (@shellphish):

    • https://github.com/mechaphish
  • pwntools, CTF framework used by Gallopsled:

    • https://github.com/Gallopsled/pwntools
  • Awesome CTF, tool list:

    • https://github.com/apsdehal/awesome-ctf
  • binjitsu:

    • https://github.com/binjitsu/binjitsu
  • 32/64 bit Intel shellcode for CTF style exploitation:

    • https://github.com/isislab/Shellcode
  • preeny, payloads for binary patching:

    • https://github.com/zardus/preeny
  • Eh'Trace (pronounced ATrace) is a binary tracing tool for Windows:

    • https://github.com/K2/EhTrace
  • flare-ida, IDA Pro scripts and plugins by the FireEye FLARE team:

    • https://github.com/fireeye/flare-ida
  • HexRaysCodeXplorer, IDA plugin for better code navigation:

    • https://github.com/REhints/HexRaysCodeXplorer
  • Qira, timeless debugger:

    • https://github.com/BinaryAnalysisPlatform/qira
  • Binary Ninja Python:

    • https://github.com/Vector35/binaryninja-python
  • radare2:

    • https://github.com/radare/radare2
  • Triton dynamic binary analysis framework:

    • https://github.com/JonathanSalwan/Triton
  • angr binary analysis framework:

    • https://github.com/angr/angr
  • Capstone disassembly/disassembler framework:

    • https://github.com/aquynh/capstone
  • Snowman Decompiler:

    • https://github.com/yegord/snowman
  • Pin unpacking and anti-evasion:

    • https://github.com/Seba0691/pinunpackingantievasion
  • tesseract-ocr:

    • https://github.com/tesseract-ocr/tesseract
  • xortool, analyze multi-byte xor cipher:

    • https://github.com/hellman/xortool
  • flare-floss, FireEye Obfuscated String Solver:

    • https://github.com/fireeye/flare-floss
  • FernFlower Java decompiler:

    • https://github.com/fesh0r/fernflower
  • dbSypy, .NET assembly editor, decompiler, and debugger:

    • https://github.com/0xd4d/dnSpy
  • JPEXS Free Flash Decompiler:

    • https://github.com/jindrapetrik/jpexs-decompiler
  • Robust ABC (ActionScript Bytecode) [Dis-]Assembler (RABCDAsm):

    • https://github.com/CyberShadow/RABCDAsm
  • WinAFL, a fork of AFL for fuzzing Windows binaries:

    • https://github.com/ivanfratric/winafl
  • Gray Hat C#:

    • https://github.com/brandonprry/grayhatcsharp_code
  • CTF write-ups by PPP:

    • https://github.com/pwning/public-writeup
  • CTFs -> CTF write-up's:

    • https://github.com/ctfs
  • Modern Binary Exploitation RPISEC:

    • https://github.com/RPISEC/MBE
  • HeXA CTF Platform:

    • https://github.com/L34p/HeXA-CTF-2015
  • CTFd:

    • https://github.com/isislab/CTFd
  • Christmas-CTF:

    • https://github.com/brian020305/Christmas-CTF
  • CTF scoreboard:

    • https://github.com/ShySec/scrimmage-scoreboard
  • DefCon CTF VM:

    • http://fuzyll.com/2016/the-defcon-ctf-vm/
    • https://github.com/fuzyll/defcon-vm

Malware

  • GRR Rapid Response:

    • https://github.com/google/grr
  • Viper, Binary analysis framework:

    • https://github.com/viper-framework/viper
  • pafish, detect sandboxes and analysis environments in the same way as malware families do:

    • https://github.com/a0rtega/pafish
  • yara:

    • https://github.com/plusvic/yara/
  • Course materials for Malware Analysis by RPISEC (2015):

    • https://github.com/RPISEC/Malware
  • APTnotes, various public documents, whitepapers and articles about APT campaigns:

    • https://github.com/kbandla/APTnotes
  • QuasarRAT (c#):

    • https://github.com/quasar/QuasarRAT
  • browsersploit, advanced browser exploit pack for doing internal and external pentesting:

    • https://github.com/julienbedard/browsersploit
  • HellKitty-In-VC Ring3 Rootkit:

    • https://github.com/aaaddress1/HellKitty-In-VC
  • PowerWorm, PowerShell-based malware:

    • https://github.com/mattifestation/PowerWorm
  • Anti Sandbox and Anti Virtual Machine Tool:

    • https://github.com/AlicanAkyol/sems
  • JSDetox, JavaScript deobfuscation:

    • https://github.com/svent/jsdetox
  • CapTipper, analyze, explore and revive HTTP malicious traffic:

    • https://github.com/omriher/CapTipper

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.