Blessed Uyo's Projects
Artificial Intelligence Infrastructure-as-Code Generator.
This repo contains some Amsi Bypass methods i found on different Blog Posts.
The Hunt for Malicious Strings
This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL
Dockerized - PHP & MySQL application test attempt, fully deployed using Ansible with some key flexibility
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Small and highly portable detection tests based on MITRE's ATT&CK.
A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.
Lessons and examples to get started using aws lambda function in python
AWS Security Tools (AST) in a simple Docker container. :package:
Template for integration
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
A tool to kill antimalware protected processes
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
Tis Repo hosts scripts to convert Bash to Python script
Browser In The Browser (BITB) Templates
This is the updated version of blackeye with ngrok
You didn't think I'd go and leave the blue team out, right?
Automate Recon phase of BugBounty or Blackbox PenTest
Bug Bounty Tools used on Twitch - Recon
Build AD on Win Server
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Grab cam shots from target's phone front camera or PC webcam just sending a link.
Tool for Active Directory Certificate Services enumeration and abuse
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
Command line tool for Amazon Route 53