Lists (1)
Sort Name ascending (A-Z)
Starred repositories
An open-source long-horizon SuperAgent harness that researches, codes, and creates. With the help of sandboxes, memories, tools, skill, subagents and message gateway, it handles different levels of…
Extract Windows credentials directly from VM memory snapshots and virtual disks
Real-time speech translation — macOS & Windows, free TTS, no server, your API keys only
753+ structured cybersecurity skills for AI agents · MITRE ATT&CK mapped · agentskills.io open standard · Works with Claude Code, GitHub Copilot, OpenAI Codex CLI, Cursor, Gemini CLI & 20+ platform…
The goal of this repository is to document the most common techniques to bypass AppLocker.
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
Official inference framework for 1-bit LLMs
AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
AdaptixC2 is a highly modular advanced redteam toolkit
MCP Server for Cobalt Strike interaction.
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
A centralized resource for previously documented WDAC bypass techniques
Advanced Command and Control Framework for Authorized Red Team Operations
Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploitation, with zero human intervention.
Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from silent in-process BOF to full PowerShell/WMI.
OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This repository will grow every time will research, there is a resear…
A tool for BLE environment monitoring. Find and track Bluetooth devices around, and get notified when the target device is detected.
Open source platform for cyber security analysts with many features for threat intelligence and detection engineering.
This map lists the essential techniques to bypass anti-virus and EDR
This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…