Lists (11)
Sort Name ascending (A-Z)
Stars
A command and control framework written in rust.
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
AV/EDR Evasion Lab for Training & Learning Purposes
Ranked leaderboard for Geoguessr, a browser-based geography game
real time face swap and one-click video deepfake with only a single image
This repository provides a clear and accessible reference for mapping Windows APIs to their corresponding system calls (syscalls). It aims to help developers and researchers quickly identify which …
Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC
BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR
Aggressor scripts for use with Cobalt Strike 3.0+
OSINT Tool: Generate username lists for companies on LinkedIn
WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.
A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of t…
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It ca…
Hunting and injecting RWX 'mockingjay' DLLs in pure nim
Driver loader for bypassing Windows x64 Driver Signature Enforcement
A Python module to bypass Cloudflare's anti-bot page.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
🦀 Small exercises to get you used to reading and writing Rust code!
Port of Cobalt Strike's Process Inject Kit
Pywal-like color palette generator, but faster and in C
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
A curated list of Rust code and resources.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Python implementation of GhostPack's Seatbelt situational awareness tool
Python version of the C# tool for "Shadow Credentials" attacks
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.