Jrb's Projects
Tool for extracting information from newly spawned processes
3XFVNTXM PHP OBFUSCATOR V1
Repositório para versionar Laboratório e Scripts importantes do curso de DevSecOps 4linux
Tools for discovery and abuse of COM hijacks
Repository with quick triggers to help during Pentest in an Active Directory environment.
Scripts voltados à segurança do Active Directory. Soluções e técnicas utilizadas para aumentar a segurança da infraestrutura de Active Directory
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
Powershell script to do domain auditing automation
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
John Strand - Offensive Countermeasures
Active Directory Integrated DNS dumping by any authenticated user
Microsoft signed ActiveDirectory PowerShell module
Powershell tool to automate Active Directory enumeration.
A repo to support the book Adversarial-Tradecraft-in-Cybersecurity
PowerView menu for Cobalt Strike
Aladdin - Generate payloads for RedTeam.
All about bug bounty (bypasses, payloads, and etc)
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,
Fast and customizable subdomain wordlist generator using DSL
CIS Baseline Ansible Role for Amazon Linux 2
CIS Amazon Linux 2 Benchmark - v2.0.0 - 07-28-2021
Android App Security Checklist
Ansible role for security hardening. Mirror of code maintained at opendev.org.
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
A malicious Apache module with rootkit functionality
A backdoor module for Apache2
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
Scanning APK file for URIs, endpoints & secrets.