Stars
A swiss army knife for pentesting networks
The recursive internet scanner for hackers. 🧡
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Extract credentials from lsass remotely
Fully featured and community-driven hacking environment
A collection of Azure AD/Entra tools for offensive and defensive security purposes
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information colle…
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive …
The SpecterOps project management and reporting engine
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Syscall Shellcode Loader (Work in Progress)
Burp Suite Certified Practitioner Exam Study
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform
A simple python packer to easily bypass Windows Defender
The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
A script that helps you understand why your E-Mail ended up in Spam
Scripts that are useful for me on pen tests
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Proof-of-concept obfuscation toolkit for C# post-exploitation tools