{"id":23384956,"url":"https://github.com/mubix/repos","last_synced_at":"2025-04-08T11:25:18.561Z","repository":{"id":51852919,"uuid":"257351488","full_name":"mubix/repos","owner":"mubix","description":"List of Repositories","archived":false,"fork":false,"pushed_at":"2021-10-22T13:58:07.000Z","size":158,"stargazers_count":96,"open_issues_count":0,"forks_count":22,"subscribers_count":10,"default_branch":"master","last_synced_at":"2025-04-04T19:15:42.380Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-3-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/mubix.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-04-20T17:11:50.000Z","updated_at":"2025-02-25T10:15:18.000Z","dependencies_parsed_at":"2022-08-23T02:20:07.023Z","dependency_job_id":null,"html_url":"https://github.com/mubix/repos","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mubix%2Frepos","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mubix%2Frepos/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mubix%2Frepos/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mubix%2Frepos/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/mubix","download_url":"https://codeload.github.com/mubix/repos/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247831501,"owners_count":21003401,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-12-21T23:34:32.466Z","updated_at":"2025-04-08T11:25:18.540Z","avatar_url":"https://github.com/mubix.png","language":null,"readme":"# List of Repositories\n\nThis is just a list of repositories I tend to find useful or interesting... Not sure how well sorting will work out...\n\n## Comprehensive Resources\n- https://github.com/swisskyrepo/PayloadsAllTheThings\n- https://www.ired.team/\n- https://github.com/danielmiessler/SecLists\n- https://gtfobins.github.io/\n- https://lolbas-project.github.io/\n- https://github.com/trimstray/the-book-of-secret-knowledge\n- https://github.com/xapax/security\n- https://github.com/xrkk/awesome-cyber-security\n- https://github.com/Spacial/csirt\n- https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki\n- https://rmusser.net/docs/index.html\n- https://dmcxblue.gitbook.io/red-team-notes-2-0/\n\n## Recon\n\n### External\n- https://github.com/OWASP/Amass\n\n### OSINT\n- LinkedIn Intel - https://github.com/vysecurity/LinkedInt\n- WeakestLink (LinkedIn) - https://github.com/shellfarmer/WeakestLink\n- Gather Contacts (Google) - https://github.com/clr2of8/GatherContacts\n\n### Internal\n- https://github.com/rvrsh3ll/eavesarp (Watches ARP for inter-IP communication)\n- https://github.com/mzfr/gtfo (Located GTFO/LOLBAS binaries on disk)\n- PXE CLient - https://github.com/Meatballs1/PXEClient\n\n### Port Scanning\n- RustScan - https://github.com/RustScan/RustScan\n\n### Egress Busting\n- Go-Out - https://github.com/sensepost/go-out\n\n## Windows\n\n### BloodHound / SharpHound\n- https://github.com/BloodHoundAD/BloodHound\n- https://github.com/BloodHoundAD/SharpHound3\n- https://github.com/fox-it/BloodHound.py\n- Bloodhound Import (direct import into Neo4j) - https://github.com/fox-it/bloodhound-import\n- Cypheroth (Awesome bloodhound query repo) - https://github.com/seajaysec/cypheroth\n- \"Custom Queries\" (another bloodhound query repo) - https://github.com/awsmhacks/awsmBloodhoundCustomQueries\n- \"Custom Queries\" (another bloodhound query repo - more updated) - https://github.com/hausec/Bloodhound-Custom-Queries\n\n### ActiveDirectory\n- Cheat Sheet - https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet\n- PywerView (Python version of PowerView) - https://github.com/the-useless-one/pywerview\n- ADModule (Import ActiveDirectory module without installing RSAT) - https://github.com/samratashok/ADModule\n- MSLDAP - https://github.com/skelsec/msldap\n\n### GPO\n- Grouper2 - https://github.com/l0ss/Grouper2\n- SharpGPO - https://github.com/Dliv3/sharpgpo\n- SharpGPOAbuse - https://github.com/FSecureLABS/SharpGPOAbuse\n\n### ACLs\n- ALCPwn (connects to Neo4j and executes changes) https://github.com/fox-it/aclpwn.py\n\n### Mimikatz\n- https://github.com/gentilkiwi/mimikatz\n- https://github.com/gentilkiwi/kekeo\n- Invoke-UpdateMimikatzScript.ps1 - https://gist.github.com/ihack4falafel/8b41d810d79cb16a4b1bca5ff6600b17\n\n### Windows Shares\n- SMBMap - https://github.com/ShawnDEvans/smbmap\n- Snaffler - https://github.com/SnaffCon/Snaffler\n\n### Kerberos\n- https://github.com/ropnop/kerbrute\n- Kerbeos Attack Cheatsheet - https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a\n\n### MSSQL\n- https://github.com/NetSPI/PowerUpSQL\n- https://github.com/Keramas/mssqli-duet/\n\n### Sharp / CSharp Tools\n- https://github.com/GhostPack/SharpDump\n- SharPersist (persistence automation) - https://github.com/fireeye/SharPersist\n- https://github.com/rasta-mouse/MiscTools\n- Watson (looks for missing patches) - https://github.com/rasta-mouse/Watson \n- CertEXP (Extracts exportable certificates) - https://github.com/mubix/certexp\n- Internal Monologue (steal creds w/o admin)  - https://github.com/eladshamir/Internal-Monologue\n- ProcessInjection - https://github.com/ZeroPointSecurity/ProcessInjection\n\n#### DotNet Obfuscation\n- ConfuserEx - https://github.com/mkaring/ConfuserEx\n\n#### DotNet DeObfuscation\n- De4dot - https://github.com/0xd4d/de4dot\n- De4dot with ConfuserEx deobfuscation - https://github.com/ViRb3/de4dot-cex\n\n#### DotNet Deserialization\n- https://github.com/Illuminopi/RCEvil.NET\n- YSoSerial.net - https://github.com/pwntester/ysoserial.net\n\n### PowerShell\n- PowerSploit DEV branch - https://github.com/PowerShellMafia/PowerSploit/tree/dev\n- PowerUpSQL - https://github.com/NetSPI/PowerUpSQL\n- PowerMAD - https://github.com/Kevin-Robertson/Powermad\n- Inveigh - https://github.com/Kevin-Robertson/Inveigh\n- Spooler bug PS1 Exploit / Original PoC - https://github.com/leechristensen/SpoolSample\n- DAMP - Remote registry exploitation - https://github.com/HarmJ0y/DAMP\n\n### Lateral Movement\n- LethalHTA (DCOM to load HTA remotely) - https://github.com/codewhitesec/LethalHTA\n- Excel4DCOM (DCOM to load Excel 4 macro) - https://github.com/outflanknl/Excel4-DCOM\n- LSASSY (Remotely dump LSASS memory) - https://github.com/Hackndo/lsassy\n- IOXIDResolver (identifies host with multiple interfaces w/o auth) - https://github.com/mubix/IOXIDResolver\n\n### Privilege Escalation\n- Change-LockScreen - https://github.com/nccgroup/Change-Lockscreen\n- RunAsTI (TrustedInstaller) - https://github.com/jschicht/RunAsTI\n- CEFDebug - https://github.com/taviso/cefdebug\n- Tokenvator - https://github.com/0xbadjuju/Tokenvator\n\n### WSUS Exploitation\n- WSUSpect (doesn't work on Win10) - https://github.com/ctxis/wsuspect-proxy\n- WSUSpendu - https://github.com/AlsidOfficial/WSUSpendu\n- SeBackupPrivilege - https://github.com/giuliano108/SeBackupPrivilege\n\n### Process Injection\n- Pinjectra - https://github.com/SafeBreach-Labs/pinjectra\n\n### Active Directory Certificate Services - ADCS\n- Whisker - https://github.com/eladshamir/Whisker\n  - PyWhisker (Python version of Whisker) https://github.com/ShutdownRepo/pywhisker\n  - These attacks require Windows 2016 functional level to have the `msDs-KeyCredentialLink` object attribute.\n- PKINIT Tools - https://github.com/dirkjanm/PKINITtools\n\n## OSX\n\n- MacSwift C2 - https://github.com/cedowens/MacShellSwift/tree/master/MacShellSwift\n\n### Jamf\n- https://github.com/FSecureLABS/Jamf-Attack-Toolkit\n\n\n## Linux\n\n- Kernel Exploits (3+ year old repo) https://github.com/lucyoa/kernel-exploits\n- NFSpy (exploiting/mounting NFS) - https://github.com/bonsaiviking/NfSpy\n\n## C2 Frameworks\n\n- Metasploit - https://github.com/rapid7/metasploit-framework\n- Empire 2- https://github.com/BC-SECURITY/Empire\n- Covenant - https://github.com/cobbr/Covenant\n- PoshC2 - https://github.com/nettitude/PoshC2\n- Sliver - https://github.com/BishopFox/sliver\n  - Sliver Scripting - https://github.com/moloch--/sliver-script\n- Merlin - https://github.com/Ne0nd0g/merlin\n- Koadic C3 - https://github.com/zerosum0x0/koadic\n- SilentTrinity - https://github.com/byt3bl33d3r/SILENTTRINITY\n\n### CobaltStrike Resources\n- https://github.com/killswitch-GUI/CobaltStrike-ToolKit\n- https://github.com/dcsync/pycobalt\n\n## DNS\n- DNS Ftp (Download file over DNS) - https://github.com/breenmachine/dnsftp\n\n## WWW\n\n- API key usage / hacks - https://github.com/streaak/keyhacks \n- Jenkins PWN - https://github.com/gquere/pwn_jenkins\n- CORStest (CORS scanner) - https://github.com/RUB-NDS/CORStest\n\n### Web Enumeration\n- GAU (Gather All Links) - https://github.com/lc/gau\n\n### Web Screenshots\n- GoWitness - https://github.com/sensepost/gowitness\n\n### Web Shells\n- ABPTTS - https://github.com/nccgroup/ABPTTS\n\n## Passwords\n\n### Hash Cracking\n- Hashcat - https://github.com/hashcat\n- John the Ripper - https://github.com/magnumripper/JohnTheRipper\n\n### Cracking Rules\n- OneRuleToRuleThemAll - https://github.com/NotSoSecure/password_cracking_rules\n\n### Cracking Masks\n- Microsoft mask is really effective - https://github.com/xfox64x/Hashcat-Stuffs\n\n### Word Lists\n- WordSmith - https://github.com/skahwah/wordsmith\n- PwDB-Public - https://github.com/FlameOfIgnis/Pwdb-Public\n\n### Password Spraying\n- PurpleSpray - https://github.com/mvelazc0/PurpleSpray\n- KerBrute - https://github.com/TarlogicSecurity/kerbrute\n\n### Password Brute Forcing\n- Patator - https://github.com/lanjelot/patator\n\n\n## Go Projects (Generic)\n- Run shellcode (Windows or Unix via hex command line arg) - https://github.com/brimstone/go-shellcode\n- Hershell - https://github.com/lesnuages/hershell\n\n## VMWare / vSphere\n- GoVC - https://github.com/vmware/govmomi/tree/master/govc\n\n### AWS\n\n- DuffleBag (Search public EBS for secrets) - https://github.com/BishopFox/dufflebag\n\n### Office365 / Azure\n- UhOh356 - https://github.com/Raikia/UhOh365\n- MSOLSpray - https://github.com/dafthack/MSOLSpray\n- ROADtools - https://github.com/dirkjanm/ROADtools\n\n### DevOps Tools\n- Master of Servers (Puppet, Cheff, Ansible exploitation) - https://github.com/master-of-servers/mose\n\n### Browser\n- Chrome Password Dumper - https://github.com/roflsandwich/Chrome-Password-Dumper\n- Browser Exploitation list - https://github.com/Escapingbug/awesome-browser-exploit\n- Chrome Cookie stealer via Remote Debugging port - https://github.com/slyd0g/WhiteChocolateMacademiaNut\n- BrowserPass (Steals Firefox and IE creds, but needs a lot of DLLs) - https://github.com/jabiel/BrowserPass\n\n## Phishing\n- https://github.com/UndeadSec/SocialFish\n- Fudge (auto-download embedded files) - https://github.com/dale-ruane/fudge\n\n## Wireless\n- Wifi Phisher - https://github.com/wifiphisher/wifiphisher\n- EAP Hammer - https://github.com/s0lst1c3/eaphammer\n\n## Secrets Extraction\n- Gralwer (git) - https://github.com/jregele/grawler (ShmooCon 2018)\n- GitGot - https://github.com/BishopFox/GitGot\n- Blacklist3r - https://github.com/NotSoSecure/Blacklist3r (ASP Machine Keys - DotNet Deserialization)\n\n## Kubernetes\n- Finding and exploiting Kubernetes - https://github.com/averonesis/kubolt\n\n## Hardware\n- Defeating BIOS passwords - https://github.com/skysafe/reblog/tree/master/0000-defeating-a-laptops-bios-password\n\n## Routers and Switches\n- Routopsy (attack dynamic routing protocols) - https://github.com/sensepost/routopsy\n\n## ThreatHunting\n- ThreatHunter's playbooks - https://github.com/hunters-forge/ThreatHunter-Playbook/\n- BlueSPAWN - https://github.com/ION28/BLUESPAWN\n- PeaceMaker - https://github.com/D4stiny/PeaceMaker\n- OSCtrl (OSQuery open source management tool) - https://github.com/jmpsec/osctrl\n\n## LAB Creation\n\n- DetectionLab - https://github.com/clong/DetectionLab\n- DynamicLabs - https://github.com/ctxis/DynamicLabs\n- Mini-Internet using LXC - https://github.com/flesueur/mi-lxc\n- Microsoft's Defend the Flag - https://github.com/microsoft/DefendTheFlag/\n\n### Atomic Red Teaming\n- Leonidas by @fsecurelabs https://github.com/fsecurelabs/leonidas\n\n## Live Memory Editing / Game Cheats\n- Squalr - https://github.com/Squalr/Squalr\n\n## Pentesting Documents\n- Physical Docs - https://github.com/trustedsec/physical-docs\n\n## Honey Pots\n- https://github.com/s0md3v/Predator\n\n## Classes\n- Modern Binary Exploiration - https://github.com/RPISEC/MBE\n","funding_links":[],"categories":["Other Repos"],"sub_categories":["Sans"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmubix%2Frepos","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmubix%2Frepos","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmubix%2Frepos/lists"}