Skip to content
View r3nt0n's full-sized avatar
🌐
🌐

Block or report r3nt0n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Enemies Of Symfony - Debug mode Symfony looter

Python 322 50 Updated Oct 18, 2024

Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.

Java 45 11 Updated Dec 24, 2020

A set of programs for analyzing common vulnerabilities in COM

C++ 165 29 Updated Sep 8, 2024

Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.

Python 57 2 Updated May 31, 2024

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Python 46,845 2,149 Updated Apr 18, 2024

Adversary Emulation Framework

Go 8,781 1,176 Updated Jan 16, 2025

🚀 Caido releases, wiki and roadmap

1,246 58 Updated Jan 13, 2025

A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.

Go 2,748 238 Updated Jan 13, 2025

Cmd.exe Command Obfuscation Generator & Detection Test Harness

PowerShell 837 133 Updated Mar 27, 2018

Simple DNS Rebinding Service

C 633 79 Updated Jan 16, 2020

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

PHP 8,339 2,102 Updated Nov 10, 2023

Static binaries, removing any required dependencies from the operating system. Gziped files availabe to download via curl onto your targeted system.

Lua 59 13 Updated Oct 27, 2022

Standalone binaries for Linux/Windows of Impacket's examples

Python 724 92 Updated Jul 25, 2023

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…

927 103 Updated Jul 19, 2024

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,771 815 Updated Jan 24, 2024

Template-Driven AV/EDR Evasion Framework

Assembly 1,614 268 Updated Nov 3, 2023

Converts PE into a shellcode

C++ 2,431 442 Updated Aug 15, 2023

A pentest reporting tool written in Python. Free yourself from Microsoft Word.

Python 1,325 233 Updated Dec 18, 2024

Trying to tame the three-headed dog.

C# 4,241 792 Updated Sep 12, 2024

A collection of all the data i could extract from 1 billion leaked credentials from internet.

3,085 404 Updated Jul 1, 2020

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…

Go 552 109 Updated Sep 22, 2024

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,098 190 Updated Jul 19, 2024

collect for learning cases

VBScript 570 75 Updated Jun 16, 2024

PowerShell Obfuscator

PowerShell 3,819 769 Updated Aug 10, 2023

This map lists the essential techniques to bypass anti-virus and EDR

2,585 285 Updated Nov 25, 2024

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 1,018 79 Updated Nov 9, 2024

Pentest TeamCity using Metasploit

Ruby 43 10 Updated Feb 8, 2021

🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥

Python 1,517 103 Updated Jan 4, 2024
Shell 96 37 Updated Feb 22, 2024
Next