- AutoRecon
- Stego-toolkit
- PayloadsAllTheThings
- Chisel
- Evil-winrm
- Gef
- Exrex
- PEASS
- Movfuscator
- Unicorn
- Tpot
- RsaCtfTool
- Doona
- Ida scripts
- Omer Yair multiple projects
- Security notes
- Kite.com
- Tomnomnom
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements.
Stego-toolkit
This project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox.eu. The image comes pre-installed with many popular tools (see list below) and several screening scripts you can use check simple things (for instance, run check_jpg.sh image.jpg to get a report for a JPG file).
PayloadsAllTheThings
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !
Chisel
Chisel is a fast TCP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network. Chisel is very similar to crowbar though achieves much higher performance.
Evil-winrm
This shell is the ultimate WinRM shell for hacking/pentesting.
Gef
GEF (pronounced ʤɛf - “Jeff”) is a set of commands for x86/64, ARM, MIPS, PowerPC and SPARC to assist exploit developers and reverse-engineers when using old school GDB. It provides additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development.
Exrex
Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular expression and more. It’s pure python, without external dependencies.
PEASS
Here you will find privilege escalation tools for Windows and Linux/Unix* (in some near future also for Mac).
Movfuscator
The M/o/Vfuscator (short ‘o’, sounds like “mobfuscator”) compiles programs into “mov” instructions, and only “mov” instructions. Arithmetic, comparisons, jumps, function calls, and everything else a program needs are all performed through mov operations; there is no self-modifying code, no transport-triggered calculation, and no other form of non-mov cheating.
Unicorn
Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
Tpot
T-Pot is based on a vanilla Ubuntu 14.04.02 ISO image. The honeypot daemons as well as other support components we used have been paravirtualized using docker. This allowed us to run multiple honeypot daemons on the same network interface without problems make the entire system very low maintenance.
RsaCtfTool
RSA tool for ctf - uncipher data from weak public key and try to recover private key Automatic selection of best attack for the given public key
Doona
Doona is a fork of the Bruteforce Exploit Detector Tool (BED). BED is a program which is designed to check daemons for potential buffer overflows, format string bugs etc.
Ida scripts
Omer Yair multiple projects
Security notes
I have started to write down notes on the security related videos I watch (as a way of quick recall). These might be more useful to beginners. The order of notes here is not in order of difficulty, but in reverse chronological order of how I write them (i.e., latest first).
Kite.com
Kite is a plugin for your IDE that uses machine learning to give you useful code completions for Python. Start coding faster today.
Tomnomnom
Tools for bug bounties such as gf (grep wrapper)