Stars
Powerful Python tool to analyze PDF documents
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Python version of the Playwright testing and automation library.
Memory acquisition for Linux that makes sense.
AssemblyLine 4: File triage and malware analysis
PoCs and tools for investigation of Windows process execution techniques
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Packer templates for building minimal Vagrant baseboxes for multiple platforms
PowerShell MachineAccountQuota and DNS exploit tools
precurse / EfsPotato
Forked from zcgonvh/EfsPotatoExploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
Powershell tool to automate Active Directory enumeration.
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
In-depth attack surface mapping and asset discovery
A swiss army knife for pentesting networks
A tool to create a JScript file which loads a .NET v2 assembly from memory.
The ultimate WinRM shell for hacking/pentesting
Six Degrees of Domain Admin
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Bypass for PowerShell Constrained Language Mode
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.