Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/FuzzySecurity/Resource-List
GitHub Project Resource List
https://github.com/FuzzySecurity/Resource-List
Last synced: about 1 month ago
JSON representation
GitHub Project Resource List
- Host: GitHub
- URL: https://github.com/FuzzySecurity/Resource-List
- Owner: FuzzySecurity
- Created: 2016-04-03T02:44:44.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2016-09-02T22:55:36.000Z (over 8 years ago)
- Last Synced: 2024-05-02T02:51:01.722Z (7 months ago)
- Size: 14.6 KB
- Stars: 317
- Watchers: 33
- Forks: 84
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- Hacking-Awesome - - Collection of useful GitHub projects loosely categorised (Uncategorized / Uncategorized)
- Awesome-Hacking - Resource List
- fucking-Awesome-Hacking - Resource List
- awesome-hacking - Resource List
- awesome-hacking - Resource List
README
Resource-List
=============A collection of useful GitHub projects loosely categorised. I may end up adding non-GitHub projects + KB-style links for topics.
pwnd
----
* ODAT Oracle Database Attack Tool:
* https://github.com/quentinhardy/odat* clusterd framework, attacking JBoss, CF, WebLogic, Tomcat, Railo, Axis2, Glassfish:
* https://github.com/hatRiot/clusterd* JexBoss - Jboss verify and EXploitation Tool:
* https://github.com/joaomatosf/jexboss* The Backdoor Factory Proxy (BDFProxy):
* https://github.com/secretsquirrel/BDFProxy* impacket:
* https://github.com/CoreSecurity/impacket* CrackMapExec Windows/Active Directory swiss army knife:
* https://github.com/byt3bl33d3r/CrackMapExec* commix:
* https://github.com/stasinopoulos/commix* beef-drive, beef framework with WebRTC:
* https://github.com/tsu-iscd/beef-drive* VirtuaPlant Industrial Control Systems simulator:
* https://github.com/jseidl/virtuaplant* Responder, LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication:
* https://github.com/SpiderLabs/Responder* WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections:
* https://github.com/ctxis/wsuspect-proxy* Potato, NTLM relay PrivEsc:
* https://github.com/foxglovesec/Potato* jdwp-shellifier (Java Debug Wire Protocol):
* https://github.com/stufus/jdwp-shellifier* foxglovesec JavaUnserializeExploits:
* https://github.com/foxglovesec/JavaUnserializeExploits* KeeFarce, extraction of KeePass 2.x password database information from memory:
* https://github.com/denandz/KeeFarce* Wolves Among the Sheep, MD5 hash collision:
* https://github.com/silentsignal/sheep-wolf/* TDL (Turla Driver Loader). Driver loader for bypassing Windows x64 Driver Signature Enforcement:
* https://github.com/hfiref0x/TDL
* Ebowla, framework for Making Environmental Keyed Payloads:
* https://github.com/Genetic-Malware/Ebowla* CVE-2016-1287 POC: IKEv1/v2 buffer overflow
* https://github.com/exodusintel/disclosures/blob/master/CVE_2016_1287_PoC
* SubTee, AllTheThings -> Includes 5 Known Application Whitelisting Bypass Techniques in One File:
* https://github.com/subTee/AllTheThings* IAT_POC, IAT based payload, that bypasses DEP/ASLR protections in EMET:
* https://github.com/ShellcodeSmuggler/IAT_POC* XRulez, Windows executable that can add malicious rules to Outlook:
* https://github.com/mwrlabs/XRulez
PowerShell
----------
* BloodHound, Six Degrees of Domain Admin:
* https://github.com/adaptivethreat/Bloodhound* PowerSploit - A PowerShell Post-Exploitation Framework:
* https://github.com/PowerShellMafia/PowerSploit* PowerShellArsenal, PowerShell Module Dedicated to Reverse Engineering:
* https://github.com/mattifestation/PowerShellArsenal
* Empire, post-exploitation framework:
* https://github.com/powershellempire/empire
* PowerShell Empire Web Interface using the REST API interface:
* https://github.com/interference-security/empire-web* PowerShell live disk forensics platform:
* https://github.com/Invoke-IR/PowerForensics* PowerMemory:
* https://github.com/giMini/PowerMemory
* KeeThief, methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory:
* https://github.com/adaptivethreat/KeeThief
* mimikittenz, a post-exploitation powershell tool for extracting juicy info from memory:
* https://github.com/putterpanda/mimikittenz* Inveigh, LLMNR/NBNS spoofer/man-in-the-middle tool:
* https://github.com/Kevin-Robertson/Inveigh
* PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server:
* https://github.com/NetSPI/PowerUpSQL
* PoshPrivilege, add/remove privileges to an account/group on a local machine as well as enabling or disabling existing privileges which are applied to a current user's process token:
* https://github.com/proxb/PoshPrivilege* Tater, PowerShell implementation of Hot Potato PrivEsc:
* https://github.com/Kevin-Robertson/Tater* Powershell to CodeExecution and ProcessInjection:
* https://github.com/3gstudent/Code-Execution-and-Process-Injection
* PoshRat, PowerShell Reverse HTTP(s) Shell:
* https://github.com/subTee/PoshRat* p0wnedShell, PowerShell Runspace Post Exploitation Toolkit:
* https://github.com/Cn33liz/p0wnedShell
* PSAttack, a portable console aimed at making pentesting with PowerShell a little easier:
* https://github.com/jaredhaight/PSAttack* OutlookPersistence:
* https://github.com/enigma0x3/OutlookPersistence* Babadook: Connection-less Powershell Persistent and Resilient Backdoor
* https://github.com/jseidl/Babadook
* https://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/
* ps1-toolkit, obfuscated penetration testing PowerShell scripts:
* https://github.com/vysec/ps1-toolkit* Windows 10 hardening:
* https://gist.github.com/alirobe/7f3b34ad89a159e6daa1
CTF
---
* CTF-Workshop:
* https://github.com/kablaa/CTF-Workshop* ctf-tools:
* https://github.com/zardus/ctf-tools* Mechanical Phish framework for the DARPA Cyber Grand Challenge (@shellphish):
* https://github.com/mechaphish* pwntools, CTF framework used by Gallopsled:
* https://github.com/Gallopsled/pwntools* Awesome CTF, tool list:
* https://github.com/apsdehal/awesome-ctf* binjitsu:
* https://github.com/binjitsu/binjitsu* 32/64 bit Intel shellcode for CTF style exploitation:
* https://github.com/isislab/Shellcode* preeny, payloads for binary patching:
* https://github.com/zardus/preeny* Eh'Trace (pronounced ATrace) is a binary tracing tool for Windows:
* https://github.com/K2/EhTrace* flare-ida, IDA Pro scripts and plugins by the FireEye FLARE team:
* https://github.com/fireeye/flare-ida* HexRaysCodeXplorer, IDA plugin for better code navigation:
* https://github.com/REhints/HexRaysCodeXplorer* Qira, timeless debugger:
* https://github.com/BinaryAnalysisPlatform/qira* Binary Ninja Python:
* https://github.com/Vector35/binaryninja-python* radare2:
* https://github.com/radare/radare2* Triton dynamic binary analysis framework:
* https://github.com/JonathanSalwan/Triton* angr binary analysis framework:
* https://github.com/angr/angr* Capstone disassembly/disassembler framework:
* https://github.com/aquynh/capstone* Snowman Decompiler:
* https://github.com/yegord/snowman* Pin unpacking and anti-evasion:
* https://github.com/Seba0691/pin_unpacking_antievasion* tesseract-ocr:
* https://github.com/tesseract-ocr/tesseract
* xortool, analyze multi-byte xor cipher:
* https://github.com/hellman/xortool* flare-floss, FireEye Obfuscated String Solver:
* https://github.com/fireeye/flare-floss* FernFlower Java decompiler:
* https://github.com/fesh0r/fernflower* dbSypy, .NET assembly editor, decompiler, and debugger:
* https://github.com/0xd4d/dnSpy* JPEXS Free Flash Decompiler:
* https://github.com/jindrapetrik/jpexs-decompiler* Robust ABC (ActionScript Bytecode) [Dis-]Assembler (RABCDAsm):
* https://github.com/CyberShadow/RABCDAsm
* WinAFL, a fork of AFL for fuzzing Windows binaries:
* https://github.com/ivanfratric/winafl
* Gray Hat C#:
* https://github.com/brandonprry/gray_hat_csharp_code* CTF write-ups by PPP:
* https://github.com/pwning/public-writeup* CTFs -> CTF write-up's:
* https://github.com/ctfs* Modern Binary Exploitation RPISEC:
* https://github.com/RPISEC/MBE* HeXA CTF Platform:
* https://github.com/L34p/HeXA-CTF-2015* CTFd:
* https://github.com/isislab/CTFd* Christmas-CTF:
* https://github.com/brian020305/Christmas-CTF* CTF scoreboard:
* https://github.com/ShySec/scrimmage-scoreboard* DefCon CTF VM:
* http://fuzyll.com/2016/the-defcon-ctf-vm/
* https://github.com/fuzyll/defcon-vm
Malware
-------
* GRR Rapid Response:
* https://github.com/google/grr* Viper, Binary analysis framework:
* https://github.com/viper-framework/viper
* pafish, detect sandboxes and analysis environments in the same way as malware families do:
* https://github.com/a0rtega/pafish* yara:
* https://github.com/plusvic/yara/* Course materials for Malware Analysis by RPISEC (2015):
* https://github.com/RPISEC/Malware* APTnotes, various public documents, whitepapers and articles about APT campaigns:
* https://github.com/kbandla/APTnotes* QuasarRAT (c#):
* https://github.com/quasar/QuasarRAT
* browsersploit, advanced browser exploit pack for doing internal and external pentesting:
* https://github.com/julienbedard/browsersploit* HellKitty-In-VC Ring3 Rootkit:
* https://github.com/aaaddress1/HellKitty-In-VC* PowerWorm, PowerShell-based malware:
* https://github.com/mattifestation/PowerWorm* Anti Sandbox and Anti Virtual Machine Tool:
* https://github.com/AlicanAkyol/sems* JSDetox, JavaScript deobfuscation:
* https://github.com/svent/jsdetox* CapTipper, analyze, explore and revive HTTP malicious traffic:
* https://github.com/omriher/CapTipper