zpaav Goto Github PK
Type: User
Location: Minnesota
Type: User
Location: Minnesota
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Cyber security, Red Teaming and CTF Writeup's.
This repository is my documenting repository for learning the world of DevOps. I started this journey on the 1st January 2022 and I plan to run to March 31st for a complete 90-day romp on spending an hour a day including weekends to get a foundational knowledge across a lot of different areas that make up DevOps.
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
:wrench: Deploy customizable Active Directory labs in Azure - automatically.
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
A collection of unpublished Windower 4 addons
Unofficial Windower Addons
Active Directory Generator for upcoming domain pivoting course.
Active Directory Lab for Penetration Testing
Aggressor scripts for use with Cobalt Strike 3.0+
Malware development for red teaming workshop
Minimal examples of data structures and algorithms in Python
In-depth attack surface mapping and asset discovery
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
A powerful and user-friendly binary analysis platform!
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploitable issues and common attack paths.
HTTP parameter discovery suite.
Adversary Tactics - PowerShell Training
C# C2 Framework centered around Stage 1 operations
Small and highly portable detection tests based on MITRE's ATT&CK.
An ffxi windower addon to automatically assist a party member in combat
Auto GEO Addon for FFXI
Auto use meds depending on debuffs
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.