Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/FuzzySecurity/Resource-List

GitHub Project Resource List
https://github.com/FuzzySecurity/Resource-List

Last synced: about 1 month ago
JSON representation

GitHub Project Resource List

Awesome Lists containing this project

README

        

Resource-List
=============

A collection of useful GitHub projects loosely categorised. I may end up adding non-GitHub projects + KB-style links for topics.

pwnd
----
* ODAT Oracle Database Attack Tool:
* https://github.com/quentinhardy/odat

* clusterd framework, attacking JBoss, CF, WebLogic, Tomcat, Railo, Axis2, Glassfish:
* https://github.com/hatRiot/clusterd

* JexBoss - Jboss verify and EXploitation Tool:
* https://github.com/joaomatosf/jexboss

* The Backdoor Factory Proxy (BDFProxy):
* https://github.com/secretsquirrel/BDFProxy

* impacket:
* https://github.com/CoreSecurity/impacket

* CrackMapExec Windows/Active Directory swiss army knife:
* https://github.com/byt3bl33d3r/CrackMapExec

* commix:
* https://github.com/stasinopoulos/commix

* beef-drive, beef framework with WebRTC:
* https://github.com/tsu-iscd/beef-drive

* VirtuaPlant Industrial Control Systems simulator:
* https://github.com/jseidl/virtuaplant

* Responder, LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication:
* https://github.com/SpiderLabs/Responder

* WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections:
* https://github.com/ctxis/wsuspect-proxy

* Potato, NTLM relay PrivEsc:
* https://github.com/foxglovesec/Potato

* jdwp-shellifier (Java Debug Wire Protocol):
* https://github.com/stufus/jdwp-shellifier

* foxglovesec JavaUnserializeExploits:
* https://github.com/foxglovesec/JavaUnserializeExploits

* KeeFarce, extraction of KeePass 2.x password database information from memory:
* https://github.com/denandz/KeeFarce

* Wolves Among the Sheep, MD5 hash collision:
* https://github.com/silentsignal/sheep-wolf/

* TDL (Turla Driver Loader). Driver loader for bypassing Windows x64 Driver Signature Enforcement:
* https://github.com/hfiref0x/TDL

* Ebowla, framework for Making Environmental Keyed Payloads:
* https://github.com/Genetic-Malware/Ebowla

* CVE-2016-1287 POC: IKEv1/v2 buffer overflow
* https://github.com/exodusintel/disclosures/blob/master/CVE_2016_1287_PoC

* SubTee, AllTheThings -> Includes 5 Known Application Whitelisting Bypass Techniques in One File:
* https://github.com/subTee/AllTheThings

* IAT_POC, IAT based payload, that bypasses DEP/ASLR protections in EMET:
* https://github.com/ShellcodeSmuggler/IAT_POC

* XRulez, Windows executable that can add malicious rules to Outlook:
* https://github.com/mwrlabs/XRulez

PowerShell
----------
* BloodHound, Six Degrees of Domain Admin:
* https://github.com/adaptivethreat/Bloodhound

* PowerSploit - A PowerShell Post-Exploitation Framework:
* https://github.com/PowerShellMafia/PowerSploit

* PowerShellArsenal, PowerShell Module Dedicated to Reverse Engineering:
* https://github.com/mattifestation/PowerShellArsenal

* Empire, post-exploitation framework:
* https://github.com/powershellempire/empire

* PowerShell Empire Web Interface using the REST API interface:
* https://github.com/interference-security/empire-web

* PowerShell live disk forensics platform:
* https://github.com/Invoke-IR/PowerForensics

* PowerMemory:
* https://github.com/giMini/PowerMemory

* KeeThief, methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory:
* https://github.com/adaptivethreat/KeeThief

* mimikittenz, a post-exploitation powershell tool for extracting juicy info from memory:
* https://github.com/putterpanda/mimikittenz

* Inveigh, LLMNR/NBNS spoofer/man-in-the-middle tool:
* https://github.com/Kevin-Robertson/Inveigh

* PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server:
* https://github.com/NetSPI/PowerUpSQL

* PoshPrivilege, add/remove privileges to an account/group on a local machine as well as enabling or disabling existing privileges which are applied to a current user's process token:
* https://github.com/proxb/PoshPrivilege

* Tater, PowerShell implementation of Hot Potato PrivEsc:
* https://github.com/Kevin-Robertson/Tater

* Powershell to CodeExecution and ProcessInjection:
* https://github.com/3gstudent/Code-Execution-and-Process-Injection

* PoshRat, PowerShell Reverse HTTP(s) Shell:
* https://github.com/subTee/PoshRat

* p0wnedShell, PowerShell Runspace Post Exploitation Toolkit:
* https://github.com/Cn33liz/p0wnedShell

* PSAttack, a portable console aimed at making pentesting with PowerShell a little easier:
* https://github.com/jaredhaight/PSAttack

* OutlookPersistence:
* https://github.com/enigma0x3/OutlookPersistence

* Babadook: Connection-less Powershell Persistent and Resilient Backdoor
* https://github.com/jseidl/Babadook
* https://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/

* ps1-toolkit, obfuscated penetration testing PowerShell scripts:
* https://github.com/vysec/ps1-toolkit

* Windows 10 hardening:
* https://gist.github.com/alirobe/7f3b34ad89a159e6daa1

CTF
---
* CTF-Workshop:
* https://github.com/kablaa/CTF-Workshop

* ctf-tools:
* https://github.com/zardus/ctf-tools

* Mechanical Phish framework for the DARPA Cyber Grand Challenge (@shellphish):
* https://github.com/mechaphish

* pwntools, CTF framework used by Gallopsled:
* https://github.com/Gallopsled/pwntools

* Awesome CTF, tool list:
* https://github.com/apsdehal/awesome-ctf

* binjitsu:
* https://github.com/binjitsu/binjitsu

* 32/64 bit Intel shellcode for CTF style exploitation:
* https://github.com/isislab/Shellcode

* preeny, payloads for binary patching:
* https://github.com/zardus/preeny

* Eh'Trace (pronounced ATrace) is a binary tracing tool for Windows:
* https://github.com/K2/EhTrace

* flare-ida, IDA Pro scripts and plugins by the FireEye FLARE team:
* https://github.com/fireeye/flare-ida

* HexRaysCodeXplorer, IDA plugin for better code navigation:
* https://github.com/REhints/HexRaysCodeXplorer

* Qira, timeless debugger:
* https://github.com/BinaryAnalysisPlatform/qira

* Binary Ninja Python:
* https://github.com/Vector35/binaryninja-python

* radare2:
* https://github.com/radare/radare2

* Triton dynamic binary analysis framework:
* https://github.com/JonathanSalwan/Triton

* angr binary analysis framework:
* https://github.com/angr/angr

* Capstone disassembly/disassembler framework:
* https://github.com/aquynh/capstone

* Snowman Decompiler:
* https://github.com/yegord/snowman

* Pin unpacking and anti-evasion:
* https://github.com/Seba0691/pin_unpacking_antievasion

* tesseract-ocr:
* https://github.com/tesseract-ocr/tesseract

* xortool, analyze multi-byte xor cipher:
* https://github.com/hellman/xortool

* flare-floss, FireEye Obfuscated String Solver:
* https://github.com/fireeye/flare-floss

* FernFlower Java decompiler:
* https://github.com/fesh0r/fernflower

* dbSypy, .NET assembly editor, decompiler, and debugger:
* https://github.com/0xd4d/dnSpy

* JPEXS Free Flash Decompiler:
* https://github.com/jindrapetrik/jpexs-decompiler

* Robust ABC (ActionScript Bytecode) [Dis-]Assembler (RABCDAsm):
* https://github.com/CyberShadow/RABCDAsm

* WinAFL, a fork of AFL for fuzzing Windows binaries:
* https://github.com/ivanfratric/winafl

* Gray Hat C#:
* https://github.com/brandonprry/gray_hat_csharp_code

* CTF write-ups by PPP:
* https://github.com/pwning/public-writeup

* CTFs -> CTF write-up's:
* https://github.com/ctfs

* Modern Binary Exploitation RPISEC:
* https://github.com/RPISEC/MBE

* HeXA CTF Platform:
* https://github.com/L34p/HeXA-CTF-2015

* CTFd:
* https://github.com/isislab/CTFd

* Christmas-CTF:
* https://github.com/brian020305/Christmas-CTF

* CTF scoreboard:
* https://github.com/ShySec/scrimmage-scoreboard

* DefCon CTF VM:
* http://fuzyll.com/2016/the-defcon-ctf-vm/
* https://github.com/fuzyll/defcon-vm

Malware
-------
* GRR Rapid Response:
* https://github.com/google/grr

* Viper, Binary analysis framework:
* https://github.com/viper-framework/viper

* pafish, detect sandboxes and analysis environments in the same way as malware families do:
* https://github.com/a0rtega/pafish

* yara:
* https://github.com/plusvic/yara/

* Course materials for Malware Analysis by RPISEC (2015):
* https://github.com/RPISEC/Malware

* APTnotes, various public documents, whitepapers and articles about APT campaigns:
* https://github.com/kbandla/APTnotes

* QuasarRAT (c#):
* https://github.com/quasar/QuasarRAT

* browsersploit, advanced browser exploit pack for doing internal and external pentesting:
* https://github.com/julienbedard/browsersploit

* HellKitty-In-VC Ring3 Rootkit:
* https://github.com/aaaddress1/HellKitty-In-VC

* PowerWorm, PowerShell-based malware:
* https://github.com/mattifestation/PowerWorm

* Anti Sandbox and Anti Virtual Machine Tool:
* https://github.com/AlicanAkyol/sems

* JSDetox, JavaScript deobfuscation:
* https://github.com/svent/jsdetox

* CapTipper, analyze, explore and revive HTTP malicious traffic:
* https://github.com/omriher/CapTipper