Skip to content
View Logan-Elliott's full-sized avatar

Block or report Logan-Elliott

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Active Directory Security

Repos regarding Active Directory security/offensive tools for red teaming AD.
23 repositories

AI/ML 🤖

26 repositories

Blue Team 📘

3 repositories

C2 Tools/Infrastructure 📡

Repos for C2 infrastructure and C2 tools.
13 repositories

CLI 🖥️

CLI tools and repos
12 repositories

Cloud Security/Pentesting ☁️

10 repositories

CobaltStrike

CobaltStrike Repos
36 repositories

Content Discovery & Fuzzing

Tools for content discovery and fuzzing.
1 repository

CRTO 🔴 ⚔️

Repos related to Zero-Point Security CRTO course for Red Team Operator 1 certification
2 repositories

CVEs

Collection of PoC for CVEs
1 repository

Docker Security 🐳

3 repositories

Domain Security

Tools regarding the security of domains, domain spoofing, subdomain takeover, etc.
3 repositories

Google Cloud Security

4 repositories

Host Enumeration & PrivEsc 🔍

Repos related to host enumeration, host recon, and PrivEsc.
1 repository

Kerberos 🐶

Repos related to Kerberos attack/defense/management
1 repository

Ludus 🏟

Ludus related repos
5 repositories

MalDocs 📃

Repos regarding maldocs
1 repository

Markdown Ⓜ️

Repos regarding Markdown and markdown tools.
6 repositories

NTLM Relaying & Forced Auth

Tools for NTLM relaying and forcing auth
3 repositories

Offsenive C#/.NET

Repos for offensive tooling in C# or .NET
10 repositories

OSINT 🕵️

A collection of repos for OSINT!
25 repositories

Password Attacks 🗝️

Repos related to password attacks, such as password spraying.
5 repositories

Persistence 💾

Repos relating to establishing/maintaining persistence on compromised hosts.
2 repositories

Phishing 🎣

Repos to aid in phishing.
11 repositories

PowerShell

Repos relating to PowerShell (Modules, Tools, Scripts, etc.)
6 repositories

Proxy & Port Forwarding

Repos and tools for proxying and port forwarding!
2 repositories

Red Team 🚩

296 repositories

Rust 🦀

Repos related to Rust
19 repositories

Subdomain Enumeration & Hacking

2 repositories

WebSockets

2 repositories

Wordlists 📖

Collection of wordlists for password cracking, fuzzing, content discovery, username enumeration, etc.
2 repositories

ZSH

Repos related to ZSH (Themes, plugins, etc.)
2 repositories

Starred repositories

Showing results

Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.

JavaScript 93 12 Updated Dec 18, 2025

A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC…

C 86 16 Updated Dec 18, 2025

🔧 Simplify LDAP proxying with essential BOFs, providing convenient helper scripts for efficient implementation and setup.

C 2 Updated Dec 21, 2025

Collection of UAC Bypass Techniques Weaponized as BOFs

C 584 74 Updated Feb 21, 2024

takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities

C 45 6 Updated Dec 20, 2025

Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark.

JavaScript 2,805 379 Updated Dec 17, 2025

Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.

Shell 181 18 Updated Mar 14, 2025

CobaltStrike后渗透测试插件

PowerShell 1,551 223 Updated Oct 28, 2021

An AI-powered task-management system you can drop into Cursor, Lovable, Windsurf, Roo, and others.

JavaScript 24,352 2,360 Updated Dec 20, 2025

Transform vague ideas into production-ready prompts. Analyze gaps, generate PRDs, and supercharge your AI coding workflow with the CLEAR framework.

TypeScript 203 25 Updated Dec 7, 2025

Serverless AITM Simulation Framework for Entra ID and M365

Python 62 7 Updated Dec 19, 2025

A simple COM server which provides a component to run shellcode

C++ 148 30 Updated May 12, 2020

Python tool to Check running WebClient services on multiple targets based on @leechristensen

Python 285 28 Updated Aug 18, 2021

Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall

Go 64 1 Updated Dec 17, 2025

A Windows Named Pipe Multi-tool / Proxy

C++ 201 14 Updated Dec 7, 2025

Proof of concept for Kerberos Armoring abuse.

Python 54 3 Updated Dec 12, 2025

An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

C++ 1,069 162 Updated Jun 17, 2022

Windows Session Hijacking via COM

C# 283 32 Updated Dec 13, 2025

Tower defense game that teaches cloud architecture. Build infrastructure, survive traffic, learn scaling.

JavaScript 3,526 397 Updated Dec 19, 2025

An experimental research tool for fabricating GitHub personas with AI-generated repositories

Python 204 20 Updated Dec 1, 2025

Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.

Go 159 40 Updated Apr 16, 2025

Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs

508 99 Updated Jun 3, 2025

Golang Automation Framework for Cobalt Strike using the Rest API

Go 55 6 Updated Dec 4, 2025

tun2socks - powered by gVisor TCP/IP stack

Go 4,732 571 Updated Nov 20, 2025

Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.

C 173 12 Updated Dec 21, 2025

Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary

Python 36 3 Updated Aug 9, 2022

Remove API hooks from a Beacon process.

C 77 17 Updated Mar 13, 2022

UDC2 implementation that provides an ICMP C2 channel

Python 97 13 Updated Nov 24, 2025

GhidRust: Rust decompiler plugin for Ghidra

Java 344 18 Updated May 18, 2024
Next