Stars
The new sqlcmd, CLI for SQL Server and Azure SQL (winget install sqlcmd / sqlcmd create mssql / sqlcmd open ads)
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
The recursive internet scanner for hackers. 🧡
OpenViking is an open-source context database designed specifically for AI Agents(such as openclaw). OpenViking unifies the management of context (memory, resources, and skills) that Agents need th…
Some scripts to abuse kerberos using Powershell
Extract Windows credentials directly from VM memory snapshots and virtual disks
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Fully automatic censorship removal for language models
754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF · agentskills.io standard · Works with Claude Code, GitHub …
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Tooling to generate metadata for Win32 APIs in the Windows SDK.
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
Command channel that uses Wi-Fi Beacons as a Bidirectional C2 transport
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
A Kerberos implementation built entirely in managed code.
BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
KslDump — Why bring your own knife when Defender already left one in the kitchen?
Situational Awareness commands implemented using Beacon Object Files
Windows protocol library, including SMB and RPC implementations, among others.
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b…
🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.