BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
-
Updated
Jan 29, 2021 - C#
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
C# Based Universal API Unhooker
This repository contains full code examples from the book Gray Hat C#
ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
Compiled tools for internal assessments
[POC] Asynchronous reverse shell using the HTTP protocol.
The Internets #1 Subdomain Takeover Tool
Enumerate and decrypt TeamViewer credentials from Windows registry
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Tool that limits bandwidth of devices on the same network without access.
Open Source Packet Editor wirtten in C# and C++
NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
Extracting Syscall Stub, Modernized
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."