Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
Force Remove Copilot, Recall and More in Windows 11
A simple, lightweight PowerShell script to remove pre-installed apps, disable telemetry, as well as perform various other changes to customize, declutter and improve your Windows experience. Win11D…
A curated list of awesome social engineering resources.
Explanation and full RCE PoC for CVE-2025-55182
A unified, interactive CLI for remotely executing scripts, managing payloads, establishing interactive command sessions, and handling file transfers across remote environments.
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
AI / LLM Red Team Field Manual & Consultant’s Handbook
Usermode exploit to bypass any AC using a 0day shatter attack.
A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …
RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools
Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopeful…
Cross-platform proxy selection with optional native authentication negotiation
Run Windows Applications on Linux as if they are native, Use linux applications to launch files files located in windows vm without needing to install applications on vm. With easy to use configura…
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
Exhaustive search and flexible filtering of Active Directory ACEs.
Step-by-step documentation on how to decrypt SCCM database secrets offline
A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
Identity-aware VPN and proxy for remote access to anything, anywhere.