Lists (8)
Sort Name ascending (A-Z)
Buccaneers
PayloadsDavy Jone's Canonballs
Active Directory besiegingDeadMan's Switch
Network toolsSkyHook
Cloud relatedThe Black Pearl
Anything affecting workstation: qol, custom scriptsThe Crow's Nest
ReconThe Fog of War
Bypass protection and stealthThe Kraken
Password krackin, sprayingStars
Information gathering framework for phone numbers
"Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file for…
Abusing impersonation privileges through the "Printer Bug"
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Azure Red Team tool for graphing Azure and Azure Active Directory objects
Tool to identify routers on the local LAN and paths to the Internet
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Wordlists for creating statistically likely username lists for use in password attacks and security testing
Tools for interacting with authentication packages using their individual message protocols
For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)
Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
Get information on a WordPress site's users
Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
A variation of ProcessOverwriting to execute shellcode on an executable's section
A Python based ingestor for BloodHound
IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.
Bring your own print driver privilege escalation tool