Lists (3)
Sort Name ascending (A-Z)
Starred repositories
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
Just another Powerview alternative but on steroids
Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.
EDR-Redir : a tool used to redirect the EDR's folder to another location.
Automated exploitation of MSSQL servers at scale
A collection of Azure AD/Entra tools for offensive and defensive security purposes
Injecting Mimikatz in a remote process and jumping into it's entry by using PE Hollowing technique.
modified mssqlclient from impacket to extract policies from the SCCM database
🐍 TOON for Python (Token-Oriented Object Notation) Encoder/Decoder - Reduce LLM token costs by 30-60% with structured data.
Windows protocol library, including SMB and RPC implementations, among others.
Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database
A tool to view and extract the contents of an Windows Installer (.msi) file.
A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …
EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.
EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.
TheDarkMark is a C2 framework designed to be fast and parallel.
PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads
Tool to enumerate privileged Scheduled Tasks on Remote Systems
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.