Lists (29)
Sort Name ascending (A-Z)
AI & LLM
APT
Asset Discovery
Backdoor & Rookit
Brute Force
C2
Cloud Security
Code Audit
Coding
Defense Evasion
Detection & Response
Discovery & Collection
Domain
Forensic Analysis
ICS & IOT
Infrastructure
Lateral Movement
Misc & Note
OSINT
Persistence
Pishing
Post Exploitation
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Shell
Vulnerability
Web Security
Wireless
Stars
AV/EDR evasion via direct system calls.
KslDump — Why bring your own knife when Defender already left one in the kitchen?
Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens
A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.
Creating a repository with all public Beacon Object Files (BoFs)
Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.
PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
Simple (relatively) things allowing you to dig a bit deeper than usual.
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers …
Check if an email address exists without sending any email, written in Rust. Comes with a ⚙️ HTTP backend.
Set of tools to analyze Windows sandboxes for exposed attack surface.
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
A tool that shows detailed information about named pipes in Windows
An open-source, AI-integrated, cross-platform terminal for seamless workflows
Force Remove Copilot, Recall and More in Windows 11
A secure, efficient TCP/UDP tunneling solution that delivers fast, reliable access across network restrictions using pre-established TCP/QUIC/WebSocket or HTTP/2 connections.