- United States
- https://linktr.ee/dylanevans11
Sponsors
Lists (32)
Sort Name ascending (A-Z)
AD Tools
AI Tools - Software Dev
Azure Tools
BOFs
C2
Cobalt Strike
CVEs
DLL Sideloading
GitHub Attack Techniques
Linux Malware Techniques
Linux Persistence
Linux Rootkits
macOS Malware Techniques
MCP Examples
Mobile Pen Test Tools
Phishing
Pivot Tools
Rust Windows Malware
Secrets Extractors
Social Engineering Tools
Web App Tools
Windows Credential Dumping
Windows Evasion Test Tools
Windows Lateral Movement
Windows Malware Development Tools
Windows Malware Techniques
Windows Privilege Escalation
Windows Reverse Engineering Tools
Windows Shellcode Templates
Windows Tiling
Wireless Tools
Zig Windows Malware
Stars
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux
A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO
Using Chromium-based browsers as a proxy for C2 traffic.
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan in-memory .NET assembly loads. This tool unhooks that functi…
🔊 Awesome list for Whisper — an open-source AI-powered speech recognition system developed by OpenAI
WhisperX: Automatic Speech Recognition with Word-level Timestamps (& Diarization)
Fast inference engine for Transformer models
BOF to run PE in Cobalt Strike Beacon without console creation
epotseluevskaya / impacket_mssqlrelay
Forked from fortra/impacketImpacket with added MSSQL Relay server
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
Fully automatic censorship removal for language models
Production-grade client-side tracing, profiling, and analysis for complex software systems.
Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
Dumping App Bound Protected Credentials & Cookies Without Privileges.
Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!
Extensible Position Independent Code – shellcode (C/C++) development and building toolkit designed for developer experience, predictability, and modularity.
Decrypt Chromium based browser passwords with PowerShell.
A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …
Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.
SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
PowerShell MachineAccountQuota and DNS exploit tools
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
Tool to enumerate privileged Scheduled Tasks on Remote Systems