pr0b3r7's Projects
:snake: Short, introductory guide for the Python programming language :green_book: :zap:
Terraform script to deploy AD-based environment on Azure
Active Directory Labs/exams Review
Arsenal is just a quick inventory and launcher for hacking programs
Assembler tinkering happens here. All your bytes are belong to us.
Atomic Purple Team Framework and Lifecycle
Automated .NET AppDomain hijack payload generation
Reference documentation for U-SQL, Stream Analytics query language, and Machine Learning Studio modules.
Creating a repository with all public Beacon Object Files (BoFs)
90+ CVEs
A script crack bcrypt hash.
This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on any box, including Linux, MacOS or Windows!
Damn Vulnerable eXtensive Training Environment
The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primarily for compromising Linux/Unix based environments. Use for research purposes only. (ref: eqgrp-auction-file.tar.xz)
Decrypted content of eqgrp-auction-file.tar.xz
The Shadow Brokers "Lost In Translation" leak. Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use for research purposes only.
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
Active Directory Lab deployed via Vagrant and Configured with Ansible (Game of Active Directory)
collection of articles/books about programing
Source code from Hacking: The Art of Exploitation (Second Edition).
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and other AV solutions, solely based on http(s) traffic.
How to configure Danderspritz and Fuzzbunch - backup fork
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Creating a resource to help build and manage an Insider Threat program.