Skip to content
View zimnyaa's full-sized avatar

Block or report zimnyaa

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

This cheatsheet maps common impacket workflows to their modern alternatives

87 5 Updated Mar 23, 2026

C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automation.

C 282 29 Updated Mar 27, 2026

Multi-protocol request logger/catcher — like Responder meets Burp Collaborator. 14 protocols, rich terminal UI, web dashboard.

Python 20 1 Updated Mar 3, 2026

Generalized Wi-Fi Client Isolation Bypasses

C 670 90 Updated Mar 13, 2026

A collection of Azure AD/Entra tools for offensive and defensive security purposes

Python 11 1 Updated Jun 9, 2025

Fast-track Azure offensive security toolkit designed for CARTP certification and CTF competitions. Automated enumeration, credential extraction, and classic exploitation techniques. Displays every …

PowerShell 26 2 Updated Dec 5, 2025

A practical client for ADWS in Golang.

Go 49 1 Updated Mar 3, 2026

A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory.

C 289 36 Updated Feb 21, 2026

SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.

Python 169 43 Updated Jan 23, 2026

Claude Code Remote Code Execution

15 1 Updated Feb 3, 2026
C++ 84 12 Updated Feb 12, 2026

Speedy probe-based UDP service scanner

Go 136 11 Updated Oct 21, 2025

An example of how to use Microsoft Windows Warbird technology

C 94 10 Updated Apr 23, 2023

A modern GoPhish fork with improved tracking accuracy and smarter detection.

Go 93 12 Updated Feb 16, 2026

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 1,808 259 Updated Apr 6, 2026

Offensive Kubernetes Threat Matrix -- kubenomicon.com

54 7 Updated Apr 1, 2026

POC for CVE-2025-4404

6 Updated Aug 11, 2025

Automate Scoping, OSINT and Recon assessments.

Shell 114 14 Updated Feb 3, 2026

Advanced shellcode implant template for Linux

C 14 4 Updated Jul 14, 2024

A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.

C 413 55 Updated Jan 11, 2026

A TUI for Active Directory collection.

Go 134 9 Updated Mar 17, 2026

Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.

Go 111 8 Updated Dec 3, 2025

A simple, reliable and reasonably fast network capture analyzer.

Python 25 Updated Mar 10, 2026
Go 43 3 Updated Dec 24, 2025

A C# utility for interacting with SCOM

C# 98 13 Updated Dec 2, 2025
Python 38 1 Updated Dec 4, 2025

Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption

C++ 215 21 Updated Dec 17, 2025
Python 216 34 Updated Dec 17, 2025

Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective

C 170 6 Updated Jan 12, 2026
Next