Stars
The recursive internet scanner for hackers. 🧡
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
OSINT tool to find informations about a github user (email2username, username2email, creation date ...)
BOF for Kerberos abuse (an implementation of some important features of the Rubeus).
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
🕵️ OSINT Tools for gathering information and actions forensics 🕵️
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
one-stop resource for all things offensive security.
SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket
Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.
TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines for eight different programming languages.
A tool written in python for scraping firebase data
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "wr…
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Syscall BOF to arbitrarily add/detract process token privilege rights.
Medusa is a speedy, parallel, and modular, login brute-forcer.
Gather and update all available and newest CVEs with their PoC.
AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.
A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.