Highlights
- All languages
- ActionScript
- Adblock Filter List
- Assembly
- Batchfile
- BitBake
- BlitzBasic
- C
- C#
- C++
- CSS
- Classic ASP
- Clojure
- CodeQL
- CoffeeScript
- ColdFusion
- Dockerfile
- Erlang
- FreeMarker
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- Max
- Mermaid
- Meson
- Nim
- Nunjucks
- OCaml
- Objective-C
- PHP
- PLpgSQL
- Pascal
- Perl
- PowerShell
- Python
- Raku
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Solidity
- SourcePawn
- Starlark
- Svelte
- Swift
- SystemVerilog
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- VCL
- Vala
- Vim Script
- Visual Basic
- Vue
- XSLT
- YARA
Starred repositories
Six Degrees of Domain Admin
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Red Teaming Tactics and Techniques
Automation for internal Windows Penetrationtest / AD-Security
My musings with PowerShell
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
netshell features all in version 2 powershell
Azure Security Resources and Notes
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
PowerShell ReverseTCP Shell - Framework
Various PowerShell scripts that may be useful during red team exercise
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)
Understand adversary tradecraft and improve detection strategies
Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
Aggressor scripts I've made for Cobalt Strike
Extract stored credentials from Internet Explorer and Edge
Use powershell to list the RDP Connections History of logged-in users or all users