Code Monkey home page Code Monkey logo

phxsec's Projects

rsocx icon rsocx

A bind/reverse Socks5 proxy server.

rtw89 icon rtw89

Driver for Realtek 8852AE, an 802.11ax device

rucksack icon rucksack

This is for weblogic docker installs, they are vulnerable so do not run them unless you know what your doing.

saas-attacks icon saas-attacks

Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown

sharphose icon sharphose

Asynchronous Password Spraying Tool in C# for Windows Environments

silenttrinity icon silenttrinity

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

sneaky-creeper icon sneaky-creeper

Get your APT on using social media as a tool for data exfiltration.

sof-elk icon sof-elk

Configuration files for the SOF-ELK VM, used in SANS FOR572

split-vpn icon split-vpn

A split tunnel VPN script for Unifi OS routers (UDM, UXG, UDR) with policy based routing.

stackboard icon stackboard

Virtual Whiteboard using Socket.io & HTML5 Canvas

sysmonsimulator icon sysmonsimulator

Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.

terminator icon terminator

Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes

tinycheck icon tinycheck

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order t

tsh icon tsh

Tiny SHell - An open-source UNIX backdoor (I'm not the author!)

untitledgoosetool icon untitledgoosetool

Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.

varc icon varc

Volatile Artifact Collector

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.