Lists (32)
Sort Name ascending (A-Z)
Active Directory Security
Repos regarding Active Directory security/offensive tools for red teaming AD.AI/ML 🤖
Blue Team 📘
C2 Tools/Infrastructure 📡
Repos for C2 infrastructure and C2 tools.CLI 🖥️
CLI tools and reposCloud Security/Pentesting ☁️
CobaltStrike
CobaltStrike ReposContent Discovery & Fuzzing
Tools for content discovery and fuzzing.CRTO 🔴 ⚔️
Repos related to Zero-Point Security CRTO course for Red Team Operator 1 certificationCVEs
Collection of PoC for CVEsDocker Security 🐳
Domain Security
Tools regarding the security of domains, domain spoofing, subdomain takeover, etc.Google Cloud Security
Host Enumeration & PrivEsc 🔍
Repos related to host enumeration, host recon, and PrivEsc.Kerberos 🐶
Repos related to Kerberos attack/defense/managementLudus 🏟
Ludus related reposMalDocs 📃
Repos regarding maldocsMarkdown Ⓜ️
Repos regarding Markdown and markdown tools.NTLM Relaying & Forced Auth
Tools for NTLM relaying and forcing authOffsenive C#/.NET
Repos for offensive tooling in C# or .NETOSINT 🕵️
A collection of repos for OSINT!Password Attacks 🗝️
Repos related to password attacks, such as password spraying.Persistence 💾
Repos relating to establishing/maintaining persistence on compromised hosts.Phishing 🎣
Repos to aid in phishing.PowerShell
Repos relating to PowerShell (Modules, Tools, Scripts, etc.)Proxy & Port Forwarding
Repos and tools for proxying and port forwarding!Red Team 🚩
Rust 🦀
Repos related to RustSubdomain Enumeration & Hacking
WebSockets
Wordlists 📖
Collection of wordlists for password cracking, fuzzing, content discovery, username enumeration, etc.ZSH
Repos related to ZSH (Themes, plugins, etc.)- All languages
- ActionScript
- Arduino
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Dart
- Dockerfile
- Go
- Groff
- HCL
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- Lua
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- R
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Standard ML
- TypeScript
- VBA
- Vala
- Vim Script
- Vue
- YARA
- Zig
Starred repositories
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC…
🔧 Simplify LDAP proxying with essential BOFs, providing convenient helper scripts for efficient implementation and setup.
Collection of UAC Bypass Techniques Weaponized as BOFs
takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark.
Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.
An AI-powered task-management system you can drop into Cursor, Lovable, Windsurf, Roo, and others.
Transform vague ideas into production-ready prompts. Analyze gaps, generate PRDs, and supercharge your AI coding workflow with the CLEAR framework.
Serverless AITM Simulation Framework for Entra ID and M365
A simple COM server which provides a component to run shellcode
Python tool to Check running WebClient services on multiple targets based on @leechristensen
almounah / silph
Forked from jfjallid/go-secdumpStealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall
Proof of concept for Kerberos Armoring abuse.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
Tower defense game that teaches cloud architecture. Build infrastructure, survive traffic, learn scaling.
An experimental research tool for fabricating GitHub personas with AI-generated repositories
Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
Golang Automation Framework for Cobalt Strike using the Rest API
Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.
Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary
Cobalt-Strike / unhook-bof
Forked from rsmudge/unhook-bofRemove API hooks from a Beacon process.
UDC2 implementation that provides an ICMP C2 channel