Lists (3)
Sort Name ascending (A-Z)
- All languages
- ActionScript
- Assembly
- Batchfile
- Boo
- Bro
- C
- C#
- C++
- CSS
- CodeQL
- CoffeeScript
- Cuda
- Cython
- Dart
- Dockerfile
- Elixir
- Elm
- Erlang
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MDX
- Makefile
- Markdown
- Mask
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SaltStack
- Scala
- ShaderLab
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- VBA
- Visual Basic
- Vue
- XSLT
- YARA
- Zig
Starred repositories
PowerSploit - A PowerShell Post-Exploitation Framework
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Empire is a PowerShell and Python post-exploitation agent.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
A collection of scripts for assessing Microsoft Azure security
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
The goal of this repository is to document the most common techniques to bypass AppLocker.
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
A post-exploitation powershell tool for extracting juicy info from memory.
PowerShell Pass The Hash Utils
Adversary Tactics - PowerShell Training
NetRipper - Smart traffic sniffing for penetration testers
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be r…
RedSnarf is a pen-testing / red-teaming tool for Windows environments
Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
PowerShell ReverseTCP Shell - Framework
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team p…
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.