Lists (32)
Sort Name ascending (A-Z)
Active Directory
ADCS
Azure
C2
Free Command & ControlCourses
Cracking
Cryptography
Detection
Dev
Dump LSASS
Enumeration
Exploit dev
Exploits
IA/LLM
Leaks
Maldev
Malware Analysis
Malwares
Misc. Tools
MSSQL
Network
Offensive Prog
OSINT
Password spray
Paywalls
Radio
SDR Bluetooth Wi-FiRecon
Red Teaming
Reverse
Reverse Engineering
Rust book tutoorials
Web
Stars
.NET assembly loader with patchless AMSI and ETW bypass in Rust
Utility to manage LCT21001 / LCT21002 laptop water coolers
Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supported)! ☢️
Your own self-hosted infra for lightweight VM sandboxes to safely execute untrusted code. CLI, API, Python SDK. ⭐ Star it if you like it! ⭐
PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph
EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.
A Telegram Mass Surveillance Bot in Python
A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows registry.
Make everyone in your VLAN ASRep roastable
A python library to create BloodHound OpenGraphs
Collection of Cyber Threat Intelligence sources from the deep and dark web
Enhance Your Active Directory Password Spraying with User Intelligence.
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
Firepwn is a tool made for testing the Security Rules of a firebase application.
The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning
[CCS'24] A dataset consists of 15,140 ChatGPT prompts from Reddit, Discord, websites, and open-source datasets (including 1,405 jailbreak prompts).
A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch calc.exe, did it even happen?
Toolset to manipulate RPC clients by finding delayed services and masquerading as them
curated list of programs to accelerate your workflow on Linux, with a focus on TUI / CLI and RAM consumption.
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup file extensions or wordlist.
fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
BackupFinder discovers backup files on web servers by generating intelligent patterns.
Deserialization payload generator for a variety of .NET formatters
SharePoint WebPart Injection Exploit Tool