Skip to content
View metac0rtex's full-sized avatar

Sponsoring

@secretsquirrel

Organizations

@DC801 @MarkVSecurity

Block or report metac0rtex

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

PEN-300 collection to help you on your exam.

PowerShell 674 157 Updated Aug 15, 2025

Wordlist, rules and masks from Kaonashi project (RootedCON 2019)

1,068 110 Updated Apr 22, 2022

A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule

558 53 Updated Oct 16, 2024

Orange Cyberdefense mindmaps

Python 1,474 240 Updated Mar 10, 2025

A workshop about Malware Development

Nim 1,720 196 Updated Jun 2, 2023

Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

C 671 121 Updated Mar 11, 2024

File upload vulnerability scanner and exploitation tool.

Python 3,279 520 Updated May 8, 2025

macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…

Python 2,288 416 Updated Aug 15, 2024

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,108 295 Updated Aug 15, 2024

ScareCrow - Payload creation framework designed around EDR bypass.

Go 2,854 521 Updated Aug 18, 2023

One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

Python 6,286 746 Updated Aug 4, 2025

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,160 336 Updated Sep 29, 2021

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 8,091 1,098 Updated Oct 2, 2025

A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)

Python 1,253 146 Updated Sep 22, 2025

Red Team Tool Kit

Shell 1,127 267 Updated Dec 8, 2022

A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.

922 122 Updated Jul 25, 2019

Some of my security stuff and vulnerabilities. Nothing advanced. More to come.

867 159 Updated Jun 11, 2019

Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

Shell 544 109 Updated Apr 14, 2021

Awesome-Cellular-Hacking

3,443 609 Updated Jun 8, 2025

linikatz is a tool to attack AD on UNIX

C 580 82 Updated Oct 19, 2023

Active Directory Assessment and Privilege Escalation Script

PowerShell 1,124 213 Updated Dec 7, 2022

RedSnarf is a pen-testing / red-teaming tool for Windows environments

PowerShell 1,215 237 Updated Sep 14, 2020
Shell 18 4 Updated Oct 20, 2018

Convert Cobalt Strike profiles to modrewrite scripts

Python 608 118 Updated Jan 30, 2023

Various scripts for different malware families

Python 106 28 Updated Apr 12, 2021

Hak5 BashBunny Payloads

PowerShell 146 30 Updated Dec 19, 2020

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

HCL 917 264 Updated Apr 6, 2021

Wiki to collect Red Team infrastructure hardening resources

4,380 913 Updated Oct 1, 2025
Next