Skip to content
View r3nt0n's full-sized avatar
🌐
🌐

Block or report r3nt0n

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Enemies Of Symfony - Debug mode Symfony looter

Python 329 51 Updated Oct 18, 2024

Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.

Java 46 11 Updated Dec 24, 2020

A set of programs for analyzing common vulnerabilities in COM

C++ 196 34 Updated Sep 8, 2024

Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.

Python 57 2 Updated May 31, 2024

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

Python 46,985 2,151 Updated Apr 18, 2024

Adversary Emulation Framework

Go 8,986 1,209 Updated Feb 25, 2025

🚀 Caido releases, wiki and roadmap

1,307 61 Updated Mar 6, 2025

A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.

Go 2,790 243 Updated Mar 3, 2025

Cmd.exe Command Obfuscation Generator & Detection Test Harness

PowerShell 853 134 Updated Mar 27, 2018

Simple DNS Rebinding Service

C 646 79 Updated Jan 16, 2020

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

PHP 8,425 2,111 Updated Nov 10, 2023

Static binaries, removing any required dependencies from the operating system. Gziped files availabe to download via curl onto your targeted system.

Lua 61 14 Updated Oct 27, 2022

Standalone binaries for Linux/Windows of Impacket's examples

Python 726 92 Updated Jul 25, 2023

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…

965 108 Updated Jul 19, 2024

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,797 815 Updated Jan 24, 2024

Template-Driven AV/EDR Evasion Framework

Assembly 1,646 268 Updated Nov 3, 2023

Converts PE into a shellcode

C++ 2,474 447 Updated Aug 15, 2023

A pentest reporting tool written in Python. Free yourself from Microsoft Word.

Python 1,356 235 Updated Dec 18, 2024

Trying to tame the three-headed dog.

C# 4,327 800 Updated Feb 1, 2025

A collection of all the data i could extract from 1 billion leaked credentials from internet.

3,110 408 Updated Jul 1, 2020

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…

Go 567 111 Updated Sep 22, 2024

Collection of PoC and offensive techniques used by the BlackArrow Red Team

C 1,097 192 Updated Jul 19, 2024

collect for learning cases

VBScript 576 75 Updated Jun 16, 2024

PowerShell Obfuscator

PowerShell 3,880 773 Updated Aug 10, 2023

This map lists the essential techniques to bypass anti-virus and EDR

2,704 302 Updated Feb 6, 2025

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 1,023 80 Updated Nov 9, 2024

Pentest TeamCity using Metasploit

Ruby 43 10 Updated Feb 8, 2021

🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥

Python 1,532 102 Updated Mar 3, 2025
Shell 99 38 Updated Feb 22, 2024
Next