Skip to content
View Yeeb1's full-sized avatar
💀
:feelsgood:
💀
:feelsgood:

Sponsoring

@S3cur3Th1sSh1t

Block or report Yeeb1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.

Java 91 3 Updated Dec 23, 2024

TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of t…

Go 33 5 Updated Dec 24, 2024

C implementation of the SSN resolution algorithm used in FreshyCalls

C 1 Updated Dec 22, 2024

Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks

C 40 7 Updated Dec 22, 2024

Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC

C# 159 16 Updated Dec 20, 2024

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

Shell 491 51 Updated Dec 19, 2024

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

Go 1,135 114 Updated Jul 14, 2024

Infrastructure Automation

Jinja 332 38 Updated Apr 12, 2024
Python 3 1 Updated Dec 18, 2024

Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

C++ 1,058 177 Updated Jun 17, 2022
Python 11 1 Updated Dec 11, 2024

SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.

C# 61 14 Updated May 1, 2024

A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation

C# 13 Updated Dec 18, 2024

AzureAD beacon object files

C 79 8 Updated Dec 18, 2024

Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.

Go 86 3 Updated Dec 19, 2024

ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.

Zig 131 23 Updated Dec 21, 2024

Scan for misconfigured S3 buckets across S3-compatible APIs!

Go 2,618 373 Updated Dec 12, 2024

⚡️⚡️⚡️Self-hosted collaborative bookmark manager to collect, organize, and preserve webpages, articles, and documents.

TypeScript 9,520 355 Updated Dec 25, 2024

PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.

Zig 9 1 Updated May 10, 2024

Credentials Dumper for Linux using eBPF

C 1,126 62 Updated Sep 9, 2024

searches recursive for folders where the current user has permissions

PowerShell 6 Updated Apr 13, 2024

Python3 rewrite of AsOutsider features of AADInternals

Python 38 4 Updated Dec 20, 2024

.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation

C# 250 28 Updated Nov 3, 2024

A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.

Rust 144 15 Updated Dec 15, 2024

reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuo…

Python 82 15 Updated Nov 28, 2024

Six Degrees of Domain Admin

PowerShell 9,983 1,740 Updated Jun 28, 2024

Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.

C# 716 64 Updated Aug 8, 2024

Homemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡

Shell 1,723 183 Updated Mar 13, 2024

A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.

C++ 704 87 Updated Nov 18, 2024
Next