-
SpecterOps
- Seattle, WA
- http://blog.harmj0y.net
- @harmj0y
-
pydecipher Public
Forked from mitre/pydecipherpydecipher: unfreeze and deobfuscate your frozen python code
-
-
noseyparker Public
Forked from praetorian-inc/noseyparkerNosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.
-
-
BloodHound Public
Forked from SpecterOps/BloodHoundSix Degrees of Domain Admin
-
cypher_validator Public
Simple Python validator for Cypher query syntax.
-
IndicatorOfCanary Public
Forked from HackingLZ/IndicatorOfCanaryCanary Detection
-
TrustVisualizer Public
Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.
-
SharpMove Public
Forked from 0xthirteen/SharpMove.NET Project for performing Authenticated Remote Execution
-
pylnker Public
This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.
-
counterfit Public
Forked from dtrizna/counterfita CLI that provides a generic automation layer for assessing the security of ML models
-
PEzor Public
Forked from phra/PEzorOpen-Source PE Packer
-
InlineExecute-Assembly Public
Forked from anthemtotheego/InlineExecute-AssemblyInlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…
-
BOF.NET Public
Forked from CCob/BOF.NETA .NET Runtime for Cobalt Strike's Beacon Object Files
-
SharpSphere Public
Forked from JamesCooteUK/SharpSphere.NET Project for Attacking vCenter
-
red_team_tool_countermeasures Public
Forked from mandiant/red_team_tool_countermeasures -
chronology Public
Forked from SpecterOps/chronologySpecterOps Historical Records
-
GetInjectedThreads Public
Forked from Apr4h/GetInjectedThreadsC# Implementation of Jared Atkinson's Get-InjectedThread.ps1
-
GhostLoader Public
Forked from TheWover/GhostLoaderGhostLoader - AppDomainManager - Injection - 攻壳机动队
-
faxhell Public
Forked from ionescu007/faxhellA Bind Shell Using the Fax Service and a DLL Hijack
-
sigtransplant Public
Forked from etke/sigtransplantTool to transplant a valid code signature from one Portable Executable (PE) binary to another.
-
Ps-Tools Public
Forked from outflanknl/Ps-ToolsPs-Tools, an advanced process monitoring toolkit for offensive operations
-
visualstudio-docs Public
Forked from MicrosoftDocs/visualstudio-docsThis repo is the home of the official Visual Studio, Visual Studio for Mac, Visual Studio Subscriptions, and Scripting Technologies documentation for Microsoft.
-
GadgetToJScript Public
Forked from med0x2e/GadgetToJScriptA tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
-
Zipper Public
Forked from outflanknl/ZipperZipper, a CobaltStrike file and folder compression utility.
-
PowerShellArsenal Public
Forked from mattifestation/PowerShellArsenalA PowerShell Module Dedicated to Reverse Engineering
-
WMIReg Public
Forked from airzero24/WMIRegPoC to interact with local/remote registry hives through WMI
-
ATPMiniDump Public
Forked from b4rtik/ATPMiniDumpEvading WinDefender ATP credential-theft
-
sRDI Public
Forked from monoxgas/sRDIShellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
-
RdpThief Public
Forked from 0x09AL/RdpThiefExtracting Clear Text Passwords from mstsc.exe using API Hooking.