One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
-
Updated
Jan 17, 2025 - Python
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
A high performance offensive security tool for reconnaissance and vulnerability scanning
Automated NoSQL database enumeration and web application exploitation tool.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
🆕 The Multi-Tool Web Vulnerability Scanner.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
⛔ offsec batteries included
This Script will help you to gather information about your victim or friend.
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
C2/post-exploitation framework
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
swiss army knife for hackers
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
WiFi Penetration Testing Guide
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Don't let buffer overflows overflow your mind
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."