Update README.md
parent
0ccae11c08
commit
d608c9823c
|
@ -90,6 +90,7 @@ hosts, open ports/ banners, and employee names from different public sources. ht
|
||||||
* **Meterpreter_Paranoid_Mode.sh** allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate of the handler it is connecting to. https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL
|
* **Meterpreter_Paranoid_Mode.sh** allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate of the handler it is connecting to. https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL
|
||||||
* **The Backdoor Factory (BDF)** is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. https://github.com/secretsquirrel/the-backdoor-factory
|
* **The Backdoor Factory (BDF)** is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. https://github.com/secretsquirrel/the-backdoor-factory
|
||||||
* **MacroShop** a collection of scripts to aid in delivering payloads via Office Macros. https://github.com/khr0x40sh/MacroShop
|
* **MacroShop** a collection of scripts to aid in delivering payloads via Office Macros. https://github.com/khr0x40sh/MacroShop
|
||||||
|
* **UnmanagedPowerShell** Executes PowerShell from an unmanaged process. https://github.com/leechristensen/UnmanagedPowerShell
|
||||||
|
|
||||||
## Delivery
|
## Delivery
|
||||||
### Phishing
|
### Phishing
|
||||||
|
@ -206,6 +207,7 @@ data stream as a sequence of HTTPS requests and responses. https://github.com/ar
|
||||||
* **Wifiphisher** is a security tool that performs Wi-Fi automatic association attacks to force wireless clients to unknowingly connect to an attacker-controlled Access Point. https://github.com/wifiphisher/wifiphisher
|
* **Wifiphisher** is a security tool that performs Wi-Fi automatic association attacks to force wireless clients to unknowingly connect to an attacker-controlled Access Point. https://github.com/wifiphisher/wifiphisher
|
||||||
* **Evilginx** is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. https://github.com/kgretzky/evilginx
|
* **Evilginx** is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. https://github.com/kgretzky/evilginx
|
||||||
* **mana** toolkit for wifi rogue AP attacks and MitM. https://github.com/sensepost/mana
|
* **mana** toolkit for wifi rogue AP attacks and MitM. https://github.com/sensepost/mana
|
||||||
|
|
||||||
### Embedded & Peripheral Devices Hacking
|
### Embedded & Peripheral Devices Hacking
|
||||||
* **magspoof** a portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. https://github.com/samyk/magspoof
|
* **magspoof** a portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. https://github.com/samyk/magspoof
|
||||||
* **WarBerryPi** was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible. https://github.com/secgroundzero/warberry
|
* **WarBerryPi** was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible. https://github.com/secgroundzero/warberry
|
||||||
|
@ -213,6 +215,10 @@ data stream as a sequence of HTTPS requests and responses. https://github.com/ar
|
||||||
* **malusb** HID spoofing multi-OS payload for Teensy. https://github.com/ebursztein/malusb
|
* **malusb** HID spoofing multi-OS payload for Teensy. https://github.com/ebursztein/malusb
|
||||||
* **Fenrir** is a tool designed to be used "out-of-the-box" for penetration tests and offensive engagements. Its main feature and purpose is to bypass wired 802.1x protection and to give you an access to the target network. https://github.com/Orange-Cyberdefense/fenrir-ocd
|
* **Fenrir** is a tool designed to be used "out-of-the-box" for penetration tests and offensive engagements. Its main feature and purpose is to bypass wired 802.1x protection and to give you an access to the target network. https://github.com/Orange-Cyberdefense/fenrir-ocd
|
||||||
|
|
||||||
|
### Team Communication
|
||||||
|
* **RocketChat** is free, unlimited and open source. Replace email & Slack with the ultimate team chat software solution. https://rocket.chat
|
||||||
|
* **Etherpad** is an open source, web-based collaborative real-time editor, allowing authors to simultaneously edit a text document https://etherpad.net
|
||||||
|
|
||||||
### Scripts
|
### Scripts
|
||||||
* **Aggressor Scripts** is a scripting language for red team operations and adversary simulations inspired by scriptable IRC clients and bots.
|
* **Aggressor Scripts** is a scripting language for red team operations and adversary simulations inspired by scriptable IRC clients and bots.
|
||||||
* https://github.com/invokethreatguy/CSASC
|
* https://github.com/invokethreatguy/CSASC
|
||||||
|
|
Loading…
Reference in New Issue