Highlights
- Pro
Starred repositories
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Infection Monkey - An open-source adversary emulation platform
Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
A tool to create a JScript file which loads a .NET v2 assembly from memory.
Perfect DLL Proxying using forwards with absolute paths.
A library containing all P/Invoke code so you don't have to import it every time. Maintained and updated to support the latest Windows OS.
Tool for Active Directory Certificate Services enumeration and abuse
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.
AirPods liberated from Apple's ecosystem.
RACE is a PowerShell module for executing ACL attacks against Windows targets.
A collaborative, multi-platform, red teaming framework
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…