Stars
Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.
Collection of beacon BOF written to learn windows and cobaltstrike
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
A script that helps you understand why your E-Mail ended up in Spam
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
An OOB interaction gathering server and client library
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Stealing Signatures and Making One Invalid Signature at a Time
The SpecterOps project management and reporting engine
Convert Cobalt Strike profiles to modrewrite scripts
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors
Support ALL Windows Version
Identifies the bytes that Microsoft Defender flags on.
A tool to elevate privilege with Windows Tokens
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
PowerShell Pass The Hash Utils
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.