Skip to content
View niaojin's full-sized avatar

Block or report niaojin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.

PowerShell 179 22 Updated Apr 16, 2026

A CI/CD Red Team Framework for demonstrating Build Pipeline security risks.

Go 241 14 Updated Apr 29, 2026

AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments

Python 34 1 Updated Sep 17, 2025

Threat hunting command system for agentic IDEs

JavaScript 30 5 Updated Apr 13, 2026

PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every…

PowerShell 157 17 Updated Jan 25, 2026

BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation

C 126 7 Updated Mar 27, 2026

Security tools for purple team, AI security, and M365/GWS. Authorized use only.

Python 140 29 Updated Apr 26, 2026

Monitor the Windows Event Log with grep-like features or filtering for specific Event IDs

Python 126 9 Updated Mar 26, 2026
C 209 33 Updated Mar 15, 2026

how to strangle threats

Python 22 1 Updated Apr 26, 2026

Bof of RegPwn by MDSec

C 118 10 Updated Mar 15, 2026

Malware, tooling, logs, IOCs and intelligence

PowerShell 54 13 Updated Apr 20, 2026

SOCKS5 proxy tool that uses Azure Storage services as a means of communication.

Go 349 45 Updated Mar 21, 2026

THR Tooling

C++ 1 Updated Mar 20, 2026

A collection of independent CTI reports covering active threat campaigns and attacker TTPs.

2 Updated Mar 29, 2026

Filesystem interaction via firebeam virtual machine execution

Python 52 6 Updated Mar 26, 2026

Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopeful…

PowerShell 161 14 Updated Nov 23, 2025

C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automation.

C 291 29 Updated Apr 26, 2026

Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?

Go 2,162 205 Updated Apr 12, 2026

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 1,117 91 Updated Nov 9, 2024

kerberos in rust for fun and profit

Rust 73 6 Updated Mar 13, 2026

KslDump — Why bring your own knife when Defender already left one in the kitchen?

Python 313 34 Updated Apr 13, 2026

Tools for interacting with authentication packages using their individual message protocols

C++ 433 34 Updated Apr 1, 2026

The different ways to dump lsass

C 286 35 Updated Aug 15, 2025

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 1,227 139 Updated Apr 18, 2026

Slides and resources from MCTTP 2025 Talk

70 8 Updated Oct 26, 2025

A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.

C++ 318 42 Updated Aug 31, 2023

Datasets from the Sophos Active Adversary Report

13 2 Updated Feb 24, 2026
Next