Stars
A tool to transform Chromium browsers into a C2 Implant
Hashcat wrapper for attack chain automation and enhanced wordlist generation
A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, performance metrics, drag-and-drop functionality, and detailed…
Windows Domain Password Spraying Utility Written in C#
Device Code Phishing Attack written in python.
A Simple Reverse Shell Listener written in C# that accepts connections to a TCP port and runs cmd.exe
Custom Queries - Brought Up to BH4.1 syntax
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
A Python based ingestor for BloodHound
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
ScareCrow - Payload creation framework designed around EDR bypass.
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.
Gray Hat Python by Justin Seitz written in Python3 for 64 bit systems
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues i…
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
List of Awesome Red Teaming Resources
Open-Source Collection of Social Engineering Pretexts
RunasCs - Csharp and open version of windows builtin runas.exe
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios