BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
-
Updated
Jan 29, 2021 - C#
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Compiled tools for internal assessments
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
An open-source process injection enumeration tool written in C#
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
C# tool to discover low hanging fruits
Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.
Apfell implant written in C#.
NativePayload_ASM/AsynASM , Injecting Meterpreter Payload bytes into local Process via Delegation Technique [Technique D] + in-memory with delay Changing RWX to X [Bypassing AVs]
Custom malware droppers written in multiple languages.
A command-line payload delivery and execution tool
Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github dorks can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc.This list is supposed to be useful performing pen-testing of systems.
A C# console utility for interacting with MSSQL servers
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."