Skip to content
View marceloyb's full-sized avatar

Block or report marceloyb

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Reverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Anthropic. Dual-layer detection: local Ollama LLM + regex safety ne…

Python 547 62 Updated May 16, 2026

Gopacket is a clean Go implementation of Impacket, a library intended for working with network protocols.

Go 632 52 Updated May 13, 2026

Windows protocol library, including SMB and RPC implementations, among others.

C# 783 76 Updated Apr 14, 2026

Active Directory information dumper via ADWS for evasion purposes.

Python 233 13 Updated Feb 23, 2026

Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…

TypeScript 42,928 4,889 Updated May 6, 2026

Dump LSASS via physical memory read primitives in vulnerable kernel drivers

C 328 38 Updated Feb 2, 2026

An offensive data enrichment pipeline

Python 958 98 Updated May 2, 2026

Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more

Kotlin 1,142 181 Updated May 15, 2026

One WSL BOF to rule them all

C 176 13 Updated Jan 14, 2026

Elastic Security detection content for Endpoint

YARA 1,429 160 Updated May 11, 2026

Proof-of-Concept tool for extracting credential material from sessions on modern Windows systems.

C 688 63 Updated May 9, 2026

Python version of the C# tool for "Shadow Credentials" attacks

Python 896 105 Updated Feb 14, 2026

Framework for orchestrating role-playing, autonomous AI agents. By fostering collaborative intelligence, CrewAI empowers agents to work together seamlessly, tackling complex tasks.

Python 51,633 7,144 Updated May 18, 2026

TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of t…

Go 403 48 Updated Jan 23, 2025
C# 161 13 Updated Jan 27, 2025

lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection

HTML 324 29 Updated Apr 22, 2026
Python 781 113 Updated May 7, 2025

A modern 32/64-bit position independent implant template

C 1,333 215 Updated Mar 21, 2025

A collection of Azure AD/Entra tools for offensive and defensive security purposes

Python 2,602 368 Updated Feb 5, 2026

AADInternals PowerShell module for administering Azure AD and Office 365

PowerShell 1,644 252 Updated Sep 30, 2025

So, you think you have MFA? AAD/ROPC/MFA bypass testing tool

Go 129 19 Updated Nov 21, 2022

A BOF that runs unmanaged PEs inline

C 700 87 Updated Oct 23, 2024

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

Shell 7,558 1,159 Updated May 15, 2026

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,986 4,716 Updated Aug 17, 2020

A variety of AV evasion techniques written in C# for practice.

C# 98 20 Updated Apr 19, 2021

A tool to create a JScript file which loads a .NET v2 assembly from memory.

C# 1,324 301 Updated Jan 18, 2021

Automated Adversary Emulation Platform

Python 6,966 1,334 Updated May 15, 2026

Collection of various malicious functionality to aid in malware development

C++ 1,889 317 Updated Feb 28, 2024
Next