Lists (32)
Sort Name ascending (A-Z)
Active Directory Security
Repos regarding Active Directory security/offensive tools for red teaming AD.AI/ML 🤖
Blue Team 📘
C2 Tools/Infrastructure 📡
Repos for C2 infrastructure and C2 tools.CLI 🖥️
CLI tools and reposCloud Security/Pentesting ☁️
CobaltStrike
CobaltStrike ReposContent Discovery & Fuzzing
Tools for content discovery and fuzzing.CRTO 🔴 ⚔️
Repos related to Zero-Point Security CRTO course for Red Team Operator 1 certificationCVEs
Collection of PoC for CVEsDocker Security 🐳
Domain Security
Tools regarding the security of domains, domain spoofing, subdomain takeover, etc.Google Cloud Security
Host Enumeration & PrivEsc 🔍
Repos related to host enumeration, host recon, and PrivEsc.Kerberos 🐶
Repos related to Kerberos attack/defense/managementLudus 🏟
Ludus related reposMalDocs 📃
Repos regarding maldocsMarkdown Ⓜ️
Repos regarding Markdown and markdown tools.NTLM Relaying & Forced Auth
Tools for NTLM relaying and forcing authOffsenive C#/.NET
Repos for offensive tooling in C# or .NETOSINT 🕵️
A collection of repos for OSINT!Password Attacks 🗝️
Repos related to password attacks, such as password spraying.Persistence 💾
Repos relating to establishing/maintaining persistence on compromised hosts.Phishing 🎣
Repos to aid in phishing.PowerShell
Repos relating to PowerShell (Modules, Tools, Scripts, etc.)Proxy & Port Forwarding
Repos and tools for proxying and port forwarding!Red Team 🚩
Rust 🦀
Repos related to RustSubdomain Enumeration & Hacking
WebSockets
Wordlists 📖
Collection of wordlists for password cracking, fuzzing, content discovery, username enumeration, etc.ZSH
Repos related to ZSH (Themes, plugins, etc.)- All languages
- ActionScript
- Arduino
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Dart
- Dockerfile
- Go
- Groff
- HCL
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- Lua
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- R
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Standard ML
- TypeScript
- VBA
- Vala
- Vim Script
- Vue
- YARA
- Zig
Starred repositories
Hyprland is an independent, highly customizable, dynamic tiling Wayland compositor that doesn't sacrifice on its looks.
Compatibility tool for Steam Play based on Wine and additional components
PlayStation 4 emulator for Windows, Linux and macOS written in C++
Highly customizable Wayland bar for Sway and Wlroots based compositors. ✌️ 🎉
Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
projectM - Cross-platform Music Visualization Library. Open-source and Milkdrop-compatible.
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
Portable Executable reversing tool with a friendly GUI
Image viewer. Fast, easy to use. Optional video support.
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
Collection of various malicious functionality to aid in malware development
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
Hyprpaper is a wayland wallpaper utility with IPC controls.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
A wlroots-compatible Wayland color picker that does not suck.
Hyprland plugin for an i3 / sway like manual tiling layout
Win32 and Kernel abusing techniques for pentesters
New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.
Run a Exe File (PE Module) in memory (like an Application Loader)
Windows Local Privilege Escalation from Service Account to System
Evasive shellcode loader for bypassing event-based injection detection (PoC)