Giter Club home page Giter Club logo

JunSEC Strategy in CyberSecurity Consulting's Projects

docker-elk icon docker-elk

The Elastic stack (ELK) powered by Docker and Compose.

drupwn icon drupwn

Drupal enumeration & exploitation tool

email-grabber icon email-grabber

Get emails and leads list from websites, eazy with my python script :)

espusb icon espusb

Software-only ESP8266 USB Device

evilginx2 icon evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

fluxion icon fluxion

Fluxion is a remake of linset by vk496 with enhanced functionality.

godgenesis icon godgenesis

A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.

goodhound icon goodhound

Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.

goofuzz icon goofuzz

GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).

hacktheworld icon hacktheworld

An Python Script For Generating Payloads that Bypasses All Antivirus so far .

hardentools icon hardentools

Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.

hardware-and-firmware-security-guidance icon hardware-and-firmware-security-guidance

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

hashcat icon hashcat

World's fastest and most advanced password recovery utility

hate_crack icon hate_crack

A tool for automating cracking methodologies through Hashcat from the TrustedSec team.

impacket icon impacket

Impacket is a collection of Python classes for working with network protocols.

itwasalladream icon itwasalladream

A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE

kingofbugbountytips icon kingofbugbountytips

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..

linwinpwn icon linwinpwn

linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks

loki icon loki

Loki - Simple IOC and Incident Response Scanner

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.