Lists (1)
Sort Name ascending (A-Z)
Stars
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
Active Directory Integrated DNS dumping by any authenticated user
This is the tool to dump the LSASS process on modern Windows 11
policy-guardian is a firewall policy analyzer GUI. It allows users to select an XML configuration file, choose from multiple validation checks, and run them against the firewall rules. The applicat…
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
Dump processes over WMI with MSFT_MTProcess
BloodyAD is an Active Directory Privilege Escalation Framework
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
E-mails, subdomains and names Harvester - OSINT
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without relying on event logs
An even funnier way to disable windows defender. (through WSC api)