Stars
- All languages
- AGS Script
- Arduino
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CodeQL
- Dockerfile
- FreeMarker
- Go
- HCL
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Nim
- OCaml
- Open Policy Agent
- PHP
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Shell
- Smarty
- Svelte
- TypeScript
- TypeSpec
- VBA
- Verilog
- Vim Script
- Visual Basic
- Vue
- XSLT
- YARA
Launch monitor using low-cost raspberry pi and camera hardware to determine ball launch speed, angles and spin
Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.
Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data
A simple SSL/TLS proxy with mutual authentication for securing non-TLS services.
JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints thr…
Automation to assess the state of your M365 tenant against CISA's baselines
PEN-300 collection to help you on your exam.
xforcered / RemoteMonologue
Forked from 3lp4tr0n/RemoteMonologueWeaponizing DCOM for NTLM Authentication Coercions
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support
Just an obfuscation technique in a resource file in 2 possible formats
Python training for business analysts and traders
Tool to quickly enumerate IAM permissions for a Google Cloud Platform (GCP) account
A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable with a simple HTML GUI.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
A modern 32/64-bit position independent implant template
Collection of UAC Bypass Techniques Weaponized as BOFs
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals …