BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
-
Updated
Jan 29, 2021 - C#
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
C# Based Universal API Unhooker
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
This repository contains full code examples from the book Gray Hat C#
ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
[POC] Asynchronous reverse shell using the HTTP protocol.
Enumerate and decrypt TeamViewer credentials from Windows registry
Compiled tools for internal assessments
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
The Internets #1 Subdomain Takeover Tool
Tool that limits bandwidth of devices on the same network without access.
Open Source Packet Editor wirtten in C# and C++
NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments
Extracting Syscall Stub, Modernized
Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."