Skip to content
View v4nyl's full-sized avatar

Block or report v4nyl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Windows SSH Misconfiguration Discovery Tool - Map lateral movement paths through misconfigured SSH services in Active Directory environments

Python 80 11 Updated May 11, 2026

A cross platform library to write offensive and defensive security tools in Go

Go 142 6 Updated Apr 21, 2026

A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.

Python 30 11 Updated May 1, 2026

Go (formerly PowerShell) collector for adding MSSQL attack paths to BloodHound with OpenGraph

Go 324 20 Updated May 7, 2026

Export CyberArk PVWA data (users, groups, safes, accounts and permissions) into a BloodHound-compatible OpenGraph JSON file for security analysis and attack path visualization.

Go 26 5 Updated May 18, 2026

A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily

Go 300 23 Updated May 11, 2026

Windows绕过EDR实现DumpHash

PowerShell 2 Updated May 10, 2026

Store sensitive files in the cloud, or on shared media without trusting the host. LUKSbox is a Rust-based encrypted-container tool with passphrase, FIDO2 (YubiKey, Titan, Nitrokey, Windows Hello), …

Rust 506 44 Updated May 18, 2026

SharePointScavenger is an automated SharePoint scraper used to find credentials and secrets.

Python 9 Updated May 4, 2026

A credential extraction BOF for Veeam Backup and Replication and Veeam One

C 63 7 Updated May 14, 2026

Dominate the domain. Relay to royalty.

Python 312 26 Updated Mar 31, 2026

Evasive loader for .NET Framework assemblies

C# 33 16 Updated May 14, 2026

This repo contains the results of an internal re-write of impacket I undertook at my current company. It contains some of the IoCs found within the library

240 20 Updated May 18, 2026

Modify machine code in binaries with alternative x64 assembly opcodes for AV evasion

Python 177 26 Updated May 10, 2026

Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.

C# 377 46 Updated Apr 18, 2026

Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.

C++ 2,330 338 Updated Feb 15, 2026

Extract Windows credentials directly from VM memory snapshots and virtual disks

Rust 1,279 143 Updated Apr 18, 2026

BYOVD: Use 360 ​​WFP driver to block EDR/XDR network connection.

C 122 19 Updated Feb 10, 2026

Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies

C# 309 30 Updated Mar 28, 2026

An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard history.

C 111 7 Updated Apr 16, 2026

Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream.

C 228 30 Updated Apr 16, 2026

Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable API calls.

C 108 11 Updated Apr 22, 2026

BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS, no Registry APIs, no PowerShell

C 128 8 Updated Apr 6, 2026

Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime

C 91 12 Updated Mar 29, 2026

A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and static signature removal.

C 205 37 Updated Mar 15, 2026

InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution

Python 147 9 Updated May 15, 2026

BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen

C 5 1 Updated May 11, 2022

Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-si…

C++ 40 13 Updated Mar 27, 2026
Next