Lists (32)
Sort Name ascending (A-Z)
Active Directory
AI Agents
AI and LLM
AI Security
AI Social Engineering
AI Tools
AV/EDR Bypass
Challenges
Cloud Pentest
GCP, AWS, AZURECTI
CVE-POC
DevOps
Open source devops tool alternativeDevSecOps + Cloud Security
Email Solutions
General
gRPC
Incident Response
IOT Hacking
Labs
Learning Resources
MCPs
MSC
Pentest Projects
Post-Exploitation Tools
Programming
Python
RATs and C2
Red Teaming Projects
SAST
Secure Chatting
Telecom
Web Security
Stars
Everything integration for the Windows taskbar.
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse prox…
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
This program is designed to demonstrate various process injection techniques
Writing custom backdoor payloads with C# - Defcon 27 Workshop
Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
xforcered / SQLRecon
Forked from skahwah/SQLReconA C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully…
Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies
Search files for extensions as well as text within.
A C# based tool for analysing malicious OneNote documents
Source code and examples for PassiveAggression
A lightweight, stealthy HTTP/HTTPS proxy designed for offensive security assessments, traffic interception, and selective logging.