Lists (29)
Sort Name ascending (A-Z)
AI & LLM
APT
Asset Discovery
Backdoor & Rookit
Brute Force
C2
Cloud Security
Code Audit
Coding
Defense Evasion
Detection & Response
Discovery & Collection
Domain
Forensic Analysis
ICS & IOT
Infrastructure
Lateral Movement
Misc & Note
OSINT
Persistence
Pishing
Post Exploitation
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Shell
Vulnerability
Web Security
Wireless
Stars
A code-searching tool similar to ack, but faster.
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…
Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer.
Simple (relatively) things allowing you to dig a bit deeper than usual.
eBPF implementation that runs on top of Windows
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Python interface to the WebRTC Voice Activity Detector
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
tiny, portable SOCKS5 server with very moderate resource usage
Connect like there is no firewall. Securely.
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…
Windows Privilege Escalation from User to Domain Admin.
Dump cookies and credentials directly from Chrome/Edge process memory
A modern 32/64-bit position independent implant template