Resource-List
Resource-List copied to clipboard
GitHub Project Resource List
Resource-List
A collection of useful GitHub projects loosely categorised. I may end up adding non-GitHub projects + KB-style links for topics.
pwnd
-
ODAT Oracle Database Attack Tool:
- https://github.com/quentinhardy/odat
-
clusterd framework, attacking JBoss, CF, WebLogic, Tomcat, Railo, Axis2, Glassfish:
- https://github.com/hatRiot/clusterd
-
JexBoss - Jboss verify and EXploitation Tool:
- https://github.com/joaomatosf/jexboss
-
The Backdoor Factory Proxy (BDFProxy):
- https://github.com/secretsquirrel/BDFProxy
-
impacket:
- https://github.com/CoreSecurity/impacket
-
CrackMapExec Windows/Active Directory swiss army knife:
- https://github.com/byt3bl33d3r/CrackMapExec
-
commix:
- https://github.com/stasinopoulos/commix
-
beef-drive, beef framework with WebRTC:
- https://github.com/tsu-iscd/beef-drive
-
VirtuaPlant Industrial Control Systems simulator:
- https://github.com/jseidl/virtuaplant
-
Responder, LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication:
- https://github.com/SpiderLabs/Responder
-
WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections:
- https://github.com/ctxis/wsuspect-proxy
-
Potato, NTLM relay PrivEsc:
- https://github.com/foxglovesec/Potato
-
jdwp-shellifier (Java Debug Wire Protocol):
- https://github.com/stufus/jdwp-shellifier
-
foxglovesec JavaUnserializeExploits:
- https://github.com/foxglovesec/JavaUnserializeExploits
-
KeeFarce, extraction of KeePass 2.x password database information from memory:
- https://github.com/denandz/KeeFarce
-
Wolves Among the Sheep, MD5 hash collision:
- https://github.com/silentsignal/sheep-wolf/
-
TDL (Turla Driver Loader). Driver loader for bypassing Windows x64 Driver Signature Enforcement:
- https://github.com/hfiref0x/TDL
-
Ebowla, framework for Making Environmental Keyed Payloads:
- https://github.com/Genetic-Malware/Ebowla
-
CVE-2016-1287 POC: IKEv1/v2 buffer overflow
- https://github.com/exodusintel/disclosures/blob/master/CVE_2016_1287_PoC
-
SubTee, AllTheThings -> Includes 5 Known Application Whitelisting Bypass Techniques in One File:
- https://github.com/subTee/AllTheThings
-
IAT_POC, IAT based payload, that bypasses DEP/ASLR protections in EMET:
- https://github.com/ShellcodeSmuggler/IAT_POC
-
XRulez, Windows executable that can add malicious rules to Outlook:
- https://github.com/mwrlabs/XRulez
PowerShell
-
BloodHound, Six Degrees of Domain Admin:
- https://github.com/adaptivethreat/Bloodhound
-
PowerSploit - A PowerShell Post-Exploitation Framework:
- https://github.com/PowerShellMafia/PowerSploit
-
PowerShellArsenal, PowerShell Module Dedicated to Reverse Engineering:
- https://github.com/mattifestation/PowerShellArsenal
-
Empire, post-exploitation framework:
- https://github.com/powershellempire/empire
-
PowerShell Empire Web Interface using the REST API interface:
- https://github.com/interference-security/empire-web
-
PowerShell live disk forensics platform:
- https://github.com/Invoke-IR/PowerForensics
-
PowerMemory:
- https://github.com/giMini/PowerMemory
-
KeeThief, methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory:
- https://github.com/adaptivethreat/KeeThief
-
mimikittenz, a post-exploitation powershell tool for extracting juicy info from memory:
- https://github.com/putterpanda/mimikittenz
-
Inveigh, LLMNR/NBNS spoofer/man-in-the-middle tool:
- https://github.com/Kevin-Robertson/Inveigh
-
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server:
- https://github.com/NetSPI/PowerUpSQL
-
PoshPrivilege, add/remove privileges to an account/group on a local machine as well as enabling or disabling existing privileges which are applied to a current user's process token:
- https://github.com/proxb/PoshPrivilege
-
Tater, PowerShell implementation of Hot Potato PrivEsc:
- https://github.com/Kevin-Robertson/Tater
-
Powershell to CodeExecution and ProcessInjection:
- https://github.com/3gstudent/Code-Execution-and-Process-Injection
-
PoshRat, PowerShell Reverse HTTP(s) Shell:
- https://github.com/subTee/PoshRat
-
p0wnedShell, PowerShell Runspace Post Exploitation Toolkit:
- https://github.com/Cn33liz/p0wnedShell
-
PSAttack, a portable console aimed at making pentesting with PowerShell a little easier:
- https://github.com/jaredhaight/PSAttack
-
OutlookPersistence:
- https://github.com/enigma0x3/OutlookPersistence
-
Babadook: Connection-less Powershell Persistent and Resilient Backdoor
- https://github.com/jseidl/Babadook
- https://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/
-
ps1-toolkit, obfuscated penetration testing PowerShell scripts:
- https://github.com/vysec/ps1-toolkit
-
Windows 10 hardening:
- https://gist.github.com/alirobe/7f3b34ad89a159e6daa1
CTF
-
CTF-Workshop:
- https://github.com/kablaa/CTF-Workshop
-
ctf-tools:
- https://github.com/zardus/ctf-tools
-
Mechanical Phish framework for the DARPA Cyber Grand Challenge (@shellphish):
- https://github.com/mechaphish
-
pwntools, CTF framework used by Gallopsled:
- https://github.com/Gallopsled/pwntools
-
Awesome CTF, tool list:
- https://github.com/apsdehal/awesome-ctf
-
binjitsu:
- https://github.com/binjitsu/binjitsu
-
32/64 bit Intel shellcode for CTF style exploitation:
- https://github.com/isislab/Shellcode
-
preeny, payloads for binary patching:
- https://github.com/zardus/preeny
-
Eh'Trace (pronounced ATrace) is a binary tracing tool for Windows:
- https://github.com/K2/EhTrace
-
flare-ida, IDA Pro scripts and plugins by the FireEye FLARE team:
- https://github.com/fireeye/flare-ida
-
HexRaysCodeXplorer, IDA plugin for better code navigation:
- https://github.com/REhints/HexRaysCodeXplorer
-
Qira, timeless debugger:
- https://github.com/BinaryAnalysisPlatform/qira
-
Binary Ninja Python:
- https://github.com/Vector35/binaryninja-python
-
radare2:
- https://github.com/radare/radare2
-
Triton dynamic binary analysis framework:
- https://github.com/JonathanSalwan/Triton
-
angr binary analysis framework:
- https://github.com/angr/angr
-
Capstone disassembly/disassembler framework:
- https://github.com/aquynh/capstone
-
Snowman Decompiler:
- https://github.com/yegord/snowman
-
Pin unpacking and anti-evasion:
- https://github.com/Seba0691/pin_unpacking_antievasion
-
tesseract-ocr:
- https://github.com/tesseract-ocr/tesseract
-
xortool, analyze multi-byte xor cipher:
- https://github.com/hellman/xortool
-
flare-floss, FireEye Obfuscated String Solver:
- https://github.com/fireeye/flare-floss
-
FernFlower Java decompiler:
- https://github.com/fesh0r/fernflower
-
dbSypy, .NET assembly editor, decompiler, and debugger:
- https://github.com/0xd4d/dnSpy
-
JPEXS Free Flash Decompiler:
- https://github.com/jindrapetrik/jpexs-decompiler
-
Robust ABC (ActionScript Bytecode) [Dis-]Assembler (RABCDAsm):
- https://github.com/CyberShadow/RABCDAsm
-
WinAFL, a fork of AFL for fuzzing Windows binaries:
- https://github.com/ivanfratric/winafl
-
Gray Hat C#:
- https://github.com/brandonprry/gray_hat_csharp_code
-
CTF write-ups by PPP:
- https://github.com/pwning/public-writeup
-
CTFs -> CTF write-up's:
- https://github.com/ctfs
-
Modern Binary Exploitation RPISEC:
- https://github.com/RPISEC/MBE
-
HeXA CTF Platform:
- https://github.com/L34p/HeXA-CTF-2015
-
CTFd:
- https://github.com/isislab/CTFd
-
Christmas-CTF:
- https://github.com/brian020305/Christmas-CTF
-
CTF scoreboard:
- https://github.com/ShySec/scrimmage-scoreboard
-
DefCon CTF VM:
- http://fuzyll.com/2016/the-defcon-ctf-vm/
- https://github.com/fuzyll/defcon-vm
Malware
-
GRR Rapid Response:
- https://github.com/google/grr
-
Viper, Binary analysis framework:
- https://github.com/viper-framework/viper
-
pafish, detect sandboxes and analysis environments in the same way as malware families do:
- https://github.com/a0rtega/pafish
-
yara:
- https://github.com/plusvic/yara/
-
Course materials for Malware Analysis by RPISEC (2015):
- https://github.com/RPISEC/Malware
-
APTnotes, various public documents, whitepapers and articles about APT campaigns:
- https://github.com/kbandla/APTnotes
-
QuasarRAT (c#):
- https://github.com/quasar/QuasarRAT
-
browsersploit, advanced browser exploit pack for doing internal and external pentesting:
- https://github.com/julienbedard/browsersploit
-
HellKitty-In-VC Ring3 Rootkit:
- https://github.com/aaaddress1/HellKitty-In-VC
-
PowerWorm, PowerShell-based malware:
- https://github.com/mattifestation/PowerWorm
-
Anti Sandbox and Anti Virtual Machine Tool:
- https://github.com/AlicanAkyol/sems
-
JSDetox, JavaScript deobfuscation:
- https://github.com/svent/jsdetox
-
CapTipper, analyze, explore and revive HTTP malicious traffic:
- https://github.com/omriher/CapTipper