Coder Social home page Coder Social logo

firefalc0n's Projects

powermemory icon powermemory

Exploit the credentials present in files and memory

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

pret icon pret

Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.

psamsi icon psamsi

PSAmsi is a tool for auditing and defeating AMSI signatures.

psattack icon psattack

A portable console aimed at making pentesting with PowerShell a little easier.

psattackbuildtool icon psattackbuildtool

A tool for building PS>Attack, an offensive PowerShell console that makes it easy for pentesters to use PowerShell.

psgetsystem icon psgetsystem

getsystem via parent process using ps1 & embeded c#

psportfwd icon psportfwd

a simple portforwarder in ps1 with embeded c# code

ptf icon ptf

The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

public-pentesting-reports icon public-pentesting-reports

Curated list of public penetration test reports released by several consulting firms and academic security groups

puma-scan icon puma-scan

Puma Scan is the leading software security Visual Studio analyzer extension. Built on top of Roslyn, the open-source .NET Compiler Platform, Puma Scan provides real time, continuous source code analysis as development teams write code. Vulnerabilities are immediately displayed in the development environment as spell check and compiler warnings, preventing security bugs from entering your applications.

pushpin-web icon pushpin-web

Monitor geotagged social media from multiple platforms in real time.

red-baron icon red-baron

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

redtips icon redtips

Red Team Tips as posted by @vysecurity on Twitter

rottenpotatong icon rottenpotatong

New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.

seclists icon seclists

SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.

seth icon seth

Perform a MitM attack and extract clear text credentials from RDP connections

sharpbox icon sharpbox

SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.