Stars
Beacon Object File & C# project to check LDAP signing
PingCastle - Get Active Directory Security at 80% in 20% of the time
Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).
PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
Collection of remote authentication triggers in C#
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
Situational Awareness commands implemented using Beacon Object Files
Ghidra is a software reverse engineering (SRE) framework
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Remote operations commands implemented using Beacon Object Files
dirkjanm / nac_bypass
Forked from scipag/nac_bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Dump Azure AD Connect credentials for Azure AD and Active Directory
Best and simplest tool for website change detection, web page monitoring, and website change alerts. Perfect for tracking content changes, price drops, restock alerts, and website defacement monito…
Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.
Agentic AI Infrastructure for magnifying HUMAN capabilities.
Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.
Advanced Windows authentication token extraction and decryption tool for red team operations and security research
Burp Suite Certified Practitioner Exam Study
Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.
Azure Security Resources and Notes
BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse entities and configurable, traversable attack paths.
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.