The Internets #1 Subdomain Takeover Tool
-
Updated
Jun 18, 2024 - C#
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
The Internets #1 Subdomain Takeover Tool
Some hacking tools & resources that I wrote from scratch or modified.
.NET 7 Windows Event Tracing wrapper library
SQLiteDiskExplorer enables you to explore, catalog, and batch extract SQLite files from disks and removable media.
C# API for Nidhogg rootkit
Sandman is a NTP based backdoor for red team engagements in hardened networks.
This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.
A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
UAC Bypass By Abusing Kerberos Tickets
University project: a cryptographic system with a user-friendly interface for data encryption. Uses WPF (C#) and .NET 7
Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.
A C# based tool for analysing malicious OneNote documents
Naga is an asynchronous Hash analyzer, using VirusTotal and many apikeys
DNS over HTTPS on .NET
Created by The cybersecurity community