- SL,UT
Stars
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Wiki to collect Red Team infrastructure hardening resources
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
PEN-300 collection to help you on your exam.
A collection of awesome penetration testing resources, tools and other shiny things
File upload vulnerability scanner and exploitation tool.
Orange Cyberdefense mindmaps
A collection of various awesome lists for hackers, pentesters and security researchers
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
ScareCrow - Payload creation framework designed around EDR bypass.
A workshop about Malware Development
Convert Cobalt Strike profiles to modrewrite scripts
Active Directory Assessment and Privilege Escalation Script
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
A post exploitation framework designed to operate covertly on heavily monitored environments
Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
Various scripts for different malware families
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.