Lists (32)
Sort Name ascending (A-Z)
AD Certificate Services (ADCS)
Blockchain
Bug Bounty
Capture The Flag (CTF)
Conference Materials
Crypto Attacks
CTF
CVE
Entra ID (Azure AD)
IOS
Lang-Go
Language-Go
Learning
Mainframe
NewGen Unix CLI Tools
OSINT
pwn
Radio Frequency
Remote Procedure Calls (RPC)
Research
Reverse Engineering
SMB
Steganography
Synthesizers
Trainings
Virtualization
Web
Web shells
Windows Active Directory
Windows exploitation
Windows Post-Exploitation
Wordlists
Stars
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
IBM i *PGM Save Files and their corresponding C sources
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
Various wordlists FR & EN - Cracking French passwords
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
Visual Binary Diff (VBinDiff) displays files in hex & ASCII and can highlight the differences between 2 files
BloodHound OpenGraph Entra ID Authentication Policy Data Collector
Active Directory Firewall
Dump Azure AD Connect credentials for Azure AD and Active Directory
A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.
Python alternative to Mimikatz lsadump::dcshadow
A cross platform library to write offensive and defensive security tools in Go
Native Mac APIs for Go. Previously known as MacDriver
(WIP) Runtime Application Instruments for iOS. Previously Passionfruit