One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
-
Updated
Jul 9, 2024 - Python
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
A high performance offensive security tool for reconnaissance and vulnerability scanning
Automated NoSQL database enumeration and web application exploitation tool.
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
🆕 The Multi-Tool Web Vulnerability Scanner.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
⛔ offsec batteries included
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
This Script will help you to gather information about your victim or friend.
C2/post-exploitation framework
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
swiss army knife for hackers
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Don't let buffer overflows overflow your mind
network reconnaissance toolkit
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."