Giter Club home page Giter Club logo

Joshua Harp's Projects

anti-virus-evading-payloads icon anti-virus-evading-payloads

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!

anubis icon anubis

Subdomain enumeration and information gathering tool

api icon api

Vulners Python API wrapper

apt_report icon apt_report

Interesting apt report collection and some special ioc express

aptsimulator icon aptsimulator

A toolset to make a system look as if it was the victim of an APT attack

artillery icon artillery

The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.

asfpp icon asfpp

The Attack Simulation Framework simulates the effects of cyber-physical attacks against WSNs

assetfinder icon assetfinder

Find domains and subdomains related to a given domain

attifyos icon attifyos

Attify OS - Distro for pentesting IoT devices

authmatrix icon authmatrix

AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.

auto-elevate icon auto-elevate

Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token Impersonation

awesome-azure-pentest icon awesome-azure-pentest

A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.

awesome-ctf icon awesome-ctf

A curated list of CTF frameworks, libraries, resources and softwares

awesome-event-ids icon awesome-event-ids

Collection of Event ID ressources useful for Digital Forensics and Incident Response

awesome-fuzzing icon awesome-fuzzing

A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.

awesome-hacker-search-engines icon awesome-hacker-search-engines

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.