Skip to content
View an4kein's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report an4kein

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Beacon Object File & C# project to check LDAP signing

C# 200 28 Updated Aug 7, 2024

PingCastle - Get Active Directory Security at 80% in 20% of the time

C# 2,816 343 Updated Mar 11, 2026

Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).

C# 822 129 Updated Dec 14, 2023

PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.

C# 1,104 153 Updated May 29, 2024

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,209 297 Updated Aug 15, 2024

Collection of remote authentication triggers in C#

C 526 63 Updated May 15, 2024

A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

Python 1,123 165 Updated Jun 10, 2024
Python 257 33 Updated Jul 31, 2024

A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.

C# 1,100 180 Updated Jul 26, 2021

Situational Awareness commands implemented using Beacon Object Files

C 1,763 286 Updated Mar 10, 2026

Ghidra is a software reverse engineering (SRE) framework

Java 66,563 7,324 Updated Apr 2, 2026

Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.

C# 1,464 167 Updated Mar 17, 2026

Remote operations commands implemented using Beacon Object Files

C 1,146 175 Updated Mar 5, 2026

Script collection to bypass Network Access Control (NAC, 802.1x)

Shell 5 1 Updated Feb 18, 2026

Dump Azure AD Connect credentials for Azure AD and Active Directory

C# 785 98 Updated Aug 26, 2025

Best and simplest tool for website change detection, web page monitoring, and website change alerts. Perfect for tracking content changes, price drops, restock alerts, and website defacement monito…

Python 30,959 1,734 Updated Apr 4, 2026

Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.

Go 2,151 188 Updated Feb 23, 2026

Agentic AI Infrastructure for magnifying HUMAN capabilities.

TypeScript 11,036 1,531 Updated Mar 22, 2026

Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.

Vue 47 11 Updated Apr 1, 2026

Advanced Windows authentication token extraction and decryption tool for red team operations and security research

C# 93 18 Updated Apr 1, 2026

Burp Suite Certified Practitioner Exam Study

Python 1,360 371 Updated Mar 12, 2026

Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.

Python 293 43 Updated May 2, 2024

Azure Security Resources and Notes

PowerShell 1,723 226 Updated Feb 17, 2026

BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse entities and configurable, traversable attack paths.

Python 507 34 Updated Mar 4, 2026

A Post-exploitation Toolset for Interacting with the Microsoft Graph API

PowerShell 1,270 160 Updated Mar 27, 2026

Azure JWT Token Manipulation Toolset

PowerShell 724 112 Updated Dec 6, 2024

A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting

1,802 261 Updated Sep 29, 2025

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Python 42,956 4,506 Updated Apr 2, 2026
Next