Code Monkey home page Code Monkey logo

Namig Aghamaliyev's Projects

awesome-command-control icon awesome-command-control

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.

awesome-shodan-queries icon awesome-shodan-queries

๐Ÿ” A collection of interesting, funny, and depressing search queries to plug into shodan.io ๐Ÿ‘ฉโ€๐Ÿ’ป

awesome-yara icon awesome-yara

A curated list of awesome YARA rules, tools, and people.

bhg icon bhg

Code samples for No Starch Press Black Hat Go

byob icon byob

An open-source post-exploitation framework for students, researchers and developers.

cilocks icon cilocks

Crack Interface lockscreen, Metasploit and More Android Hacking

covenant icon covenant

Covenant is a collaborative .NET C2 framework for red teamers.

enum4linux icon enum4linux

enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts

ffuf icon ffuf

Fast web fuzzer written in Go

grr icon grr

GRR Rapid Response: remote live forensics for incident response

hacker-roadmap icon hacker-roadmap

A collection of hacking tools, resources and references to practice ethical hacking.

infosec_reference icon infosec_reference

An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

kubespray icon kubespray

Deploy a Production Ready Kubernetes Cluster

malware-samples icon malware-samples

A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net

mimikatz icon mimikatz

A little tool to play with Windows security

plaso icon plaso

Super timeline all the things

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

py4e icon py4e

Web site for www.py4e.com and source to the Python 3.0 textbook

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

sleuthkit icon sleuthkit

The Sleuth Kitยฎ (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.