Starred repositories
This cheatsheet maps common impacket workflows to their modern alternatives
C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automation.
Multi-protocol request logger/catcher — like Responder meets Burp Collaborator. 14 protocols, rich terminal UI, web dashboard.
synacktiv / ROADtools
Forked from dirkjanm/ROADtoolsA collection of Azure AD/Entra tools for offensive and defensive security purposes
Fast-track Azure offensive security toolkit designed for CARTP certification and CTF competitions. Automated enumeration, credential extraction, and classic exploitation techniques. Displays every …
A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory.
SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.
An example of how to use Microsoft Windows Warbird technology
A modern GoPhish fork with improved tracking accuracy and smarter detection.
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
Offensive Kubernetes Threat Matrix -- kubenomicon.com
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.
A simple, reliable and reasonably fast network capture analyzer.
Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption
Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective