Starred repositories
redirect all TCP/UDP traffic of any program to SOCKS5 proxy
"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file for…
Public open-source code of malware Stuxnet (aka MyRTUs).
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teamin…
A curated list of tools that can be used for creating interactive mathematical explorables.
A suite of tools to disrupt campaigns using the Sliver C2 framework.
Decrypt encrypted Fortienet FortiOS firmware images
Create your own vulnerable by design AWS penetration testing playground
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for m…
ScareCrow - Payload creation framework designed around EDR bypass.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Fast and customizable subdomain wordlist generator using DSL
Slack enumeration and exposed secrets detection tool
A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.
A collection of tools and detections for the Sliver C2 Frameworj
The Definitive Guide To Process Cloning on Windows
Reverse engineering and pentesting for Android applications
FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…
Scanning APK file for URIs, endpoints & secrets.