Stars
The recursive internet scanner for hackers. 🧡
A swiss army knife for pentesting networks
💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF viewers, converters, and web applications. Can be used with Burp…
Fully featured and community-driven hacking environment
A collection of Azure AD/Entra tools for offensive and defensive security purposes
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Extract credentials from lsass remotely
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information colle…
The SpecterOps project management and reporting engine
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive …
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Burp Suite Certified Practitioner Exam Study
Syscall Shellcode Loader (Work in Progress)
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
A script that helps you understand why your E-Mail ended up in Spam
A simple python packer to easily bypass Windows Defender
The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
Scripts that are useful for me on pen tests
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.