Stars
This is the tool to dump the LSASS process on modern Windows 11
Extracted Yara rules from Windows Defender mpavbase and mpasbase
CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking
Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.
A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extensions UI popup highlights any misconfigurations…
Syscall Shellcode Loader (Work in Progress)
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Obtain GraphQL API schema even if the introspection is disabled
A tool for generating fake code signing certificates or signing real ones
A mostly-serverless distributed hash cracking platform
A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks
💉 Collection of prompt injections used in the open-source Giskard Scan
Cmd.exe Command Obfuscation Generator & Detection Test Harness
This is a collection of phishing templates and a landing page to be used with goPhish
Templates for the King Phisher open source phishing campaign toolkit.
Leveraging AWS Lambda Function URLs for C2 Redirection
C2 Infrastructure Automation
Reaping treasures from strings in remote processes memory
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
Deserialization payload generator for a variety of .NET formatters