Skip to content
View mpgn's full-sized avatar
🕹️
Impose ta chance, serre ton bonheur et va vers ton risque.
🕹️
Impose ta chance, serre ton bonheur et va vers ton risque.

Organizations

@cakebox @QuokkaLight

Block or report mpgn

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

We write your reusable computer vision tools. 💜

Python 36,210 3,059 Updated Dec 22, 2025

The personal finance app for everyone

Ruby 53,907 4,874 Updated Jul 24, 2025

SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.

Python 858 111 Updated Nov 6, 2025

The Network Execution Tool

Python 5,049 620 Updated Dec 24, 2025

Dump the memory of any PPL with a Userland exploit chain

C++ 348 39 Updated Mar 17, 2023

Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.

Rust 140 5 Updated Dec 25, 2025

a map for the azure oriented pentests

68 10 Updated Jul 3, 2023

You didn't think I'd go and leave the blue team out, right?

1,716 247 Updated Dec 2, 2025

KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).

C# 1,624 212 Updated Aug 6, 2022

A small POC to make defender useless by removing its token privileges and lowering the token integrity

C++ 690 128 Updated Jun 28, 2022

Convert ldapdomaindump to Bloodhound

Python 80 6 Updated Dec 19, 2023

A unique technique to execute binaries from a password protected zip

Go 1,041 151 Updated Jul 1, 2022

Dump Azure AD Connect credentials for Azure AD and Active Directory

C# 761 97 Updated Aug 26, 2025

Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!

Python 1,254 150 Updated Dec 2, 2025

A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.

Go 298 47 Updated Aug 18, 2023

For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙

1,811 282 Updated Jun 9, 2024

Reflective PE packer.

Go 1,371 223 Updated Feb 22, 2024

Kerberos relaying and unconstrained delegation abuse toolkit

Python 1,487 218 Updated Jan 27, 2025

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 8,206 1,105 Updated Dec 6, 2025

Rich is a Python library for rich text and beautiful formatting in the terminal.

Python 54,879 1,978 Updated Dec 22, 2025

Automation for internal Windows Penetrationtest / AD-Security

PowerShell 3,618 545 Updated Aug 28, 2025

Scanner for CVE-2020-0796 - SMBv3 RCE

Python 708 193 Updated Oct 1, 2020

Homemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡

Shell 1,941 207 Updated Mar 13, 2024

Advanced scanner for CVE-2020-0796 - SMBv3 RCE

Python 15 2 Updated May 22, 2023

Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

Go 4,741 499 Updated Jan 1, 2025

Abusing impersonation privileges through the "Printer Bug"

C 2,150 364 Updated Sep 10, 2020

RunasCs - Csharp and open version of windows builtin runas.exe

C# 1,313 155 Updated Jul 12, 2024

All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities

Java 799 180 Updated Nov 7, 2021

Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)

C++ 963 98 Updated Nov 4, 2025

Identifies the bytes that Microsoft Defender flags on.

C# 2,561 469 Updated Sep 14, 2023
Next