Stars
Build Real-Time Knowledge Graphs for AI Agents
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
A collection of Azure AD/Entra tools for offensive and defensive security purposes
BloodyAD is an Active Directory Privilege Escalation Framework
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
Collection of tools that reflect the network dimension into Bloodhound's data
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
Research into Undocumented Behavior of Azure AD Refresh Tokens
Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin privileges.
A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK integration
Adaptive DLL hijacking / dynamic export forwarding - EAT preserve
Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003