Giter Club home page Giter Club logo

Omar A.'s Projects

luwu icon luwu

红队基础设施自动化部署工具

malicious-pdf icon malicious-pdf

Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator

malware-1 icon malware-1

Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.

mksub icon mksub

Make subdomains using a wordlist

mortar icon mortar

evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)

nimcrypt2 icon nimcrypt2

.NET, PE, & Raw Shellcode Packer/Loader Written in Nim

nixwatch icon nixwatch

*Nix Indicator of Compromise (IOC) Assessment Tool

nuclearpond icon nuclearpond

Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.

obfuscator icon obfuscator

The program is designed to obfuscate the shellcode.

offensivevba icon offensivevba

This repo covers some code execution and AV Evasion methods for Macros in Office documents

packetstreamer icon packetstreamer

:star: :star: Distributed tcpdump for cloud native environments :star: :star:

pdiscovery-bot icon pdiscovery-bot

A projectdiscovery driven ASM bot! Using subfinder, httpx, dnsx, nuclei and notify!

peekaboo icon peekaboo

Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.

persistencesniper icon persistencesniper

Powershell script that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.

phishious icon phishious

An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.

pitraix icon pitraix

Modern Self-Modifying Cross-Platform Peer-to-Peer Botnet over TOR

pointer icon pointer

Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.

ppn icon ppn

Pentester's Promiscuous Notebook

protectmytooling icon protectmytooling

Multi-Packer allowing to daisy-chain over 29 packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable.

proxycannon-ng icon proxycannon-ng

A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference

pukpuk icon pukpuk

HTTP discovery and change monitoring tool

purple-team-cloud-lab icon purple-team-cloud-lab

cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them

recon-ad icon recon-ad

Recon-AD, an AD recon tool based on ADSI and reflective DLL’s

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.