Skip to content
@trustedsec

trustedsec

Repositories

    hate_crack

    A tool for automating cracking methodologies through Hashcat from the TrustedSec team.

    ptf

    The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

    Python 955 3,270 1 3 Updated Aug 6, 2020

    social-engineer-toolkit

    The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

    Python 1,771 5,601 85 3 Updated Jul 31, 2020

    unicorn

    Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.

    Python 667 2,488 2 0 Updated Jul 24, 2020

    hardcidr

    hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The route server is selected at random at runtime.

    Shell BSD-2-Clause 34 185 0 0 Updated Jul 17, 2020

    SysmonCommunityGuide

    TrustedSec Sysinternals Sysmon Community Guide

    CSS 61 409 3 0 Updated Jul 16, 2020

    SysWhispers

    Forked from jthuraisamy/SysWhispers

    AV/EDR evasion via direct system calls.

    Assembly Apache-2.0 108 11 0 0 Updated Jun 8, 2020
    Python 2 7 0 0 Updated Jun 1, 2020

    proxy_helper

    Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.

    JavaScript 2 1 0 0 Updated May 26, 2020

    trevorc2

    TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

    C 173 693 2 0 Updated May 7, 2020

    quicksql

    QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to use.

    Python 9 83 0 0 Updated Apr 17, 2020

    tap

    The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an organization.

    Python 85 304 0 0 Updated Apr 14, 2020

    ridenum

    Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

    Python 69 173 1 0 Updated Mar 11, 2020
    C 3 3 0 0 Updated Mar 10, 2020

    artillery

    The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.

    266 306 8 0 Updated Feb 5, 2020

    cve-2019-19781

    This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.

    Python 117 493 0 0 Updated Jan 22, 2020

    physical-docs

    This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.

    Unlicense 67 356 0 0 Updated Nov 21, 2019
    Ruby BSD-3-Clause 16 60 0 0 Updated Nov 2, 2019

    egressbuster

    Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.

    Python 82 233 0 2 Updated Sep 6, 2019

    auto_SettingContent-ms

    This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remote code execution. This automates generating an HTA downloader and embeds it in the SettingContent-ms file for you and starts Apache.

    Python 19 42 0 0 Updated Jun 15, 2018
    HTML 26 81 4 0 Updated Apr 2, 2018

    SHIPS

    The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator passwords for environments where it is not possible or not appropriate to disable these local accounts. Clients may be configured to rotate passwords automatically. Stored passwords can be retrieved by desktop support …

    JavaScript 39 113 12 1 Updated Jan 28, 2018

    nps_payload

    This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources. Written by Larry Spohn (@Spoonman1091) Payload written by Ben Mauch (@Ben0xA) aka dirty_ben

    Python 116 342 1 0 Updated Aug 8, 2017

    meterssh

    MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then conne…

    Python 192 483 4 0 Updated Apr 13, 2017

    Responder

    Forked from lgandx/Responder

    Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

    Python GPL-3.0 1,123 29 0 0 Updated Nov 10, 2016

    conqr

    ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.

    Python 21 59 1 0 Updated Sep 15, 2016

    CrackMapExec

    Forked from byt3bl33d3r/CrackMapExec

    A swiss army knife for pentesting Windows/Active Directory environments

    Python BSD-2-Clause 954 37 0 0 Updated Apr 3, 2016

    spraywmi

    SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on a system.

    Python 70 234 3 0 Updated Nov 24, 2015

    SimplyEmail

    Forked from SimplySecurity/SimplyEmail

    SimpleEmail is a email recon tool that is fast and easy framework to build on

    HTML 212 27 0 0 Updated Nov 11, 2015

Top languages

Loading…

Most used topics

Loading…

People

This organization has no public members. You must be a member to see who’s a part of this organization.

You can’t perform that action at this time.