Lists (22)
Sort Name ascending (A-Z)
2fa bypass
Used to steal someones 2fa, from the SANS Hackfest 2024.azure securing
Burp Suite Extensions
From SANS 560 Class.C2 Servers
CI Improvements
Labs Game of Active Directory
Used in SANS 560 for learning how to run AD without building it from scratch.Library Dependency Walker
From SANS hackfest 2024MAC Upgrades
Used for mac upgrades.Metasploit Addons
Used to get more power from metasploitMSBuild C#
Learn to code C# to bypass AMSI.Offensive Testing
OSCP Nots
Used to master OSCPPassword Guessing Tools
SANS 560 - GPEN
Used by SANS class for enterprise penetration testing.Sliver C2 - Extensions
Social Engineering Payloads
I got this one from my SANS 560 - GPEN Class.The Definite Guide to KQL
From the SANS Summit Hack fest 2024Training for logs
Created by Carnegie University.VMWare Fix
Fix vmware kernel issuesWindows C#/.net
Windows Discovery
Internal Scanning for hostsWindows_Forensics
Used for Windows forensics.Stars
Publicly-available tools from Rogue Valley Information Security
A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Unlocking Serverless Computing to Assess Security Controls
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
Sample queries and data as part of the Microsoft Press book, The Definitive Guide to KQL
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
PowerSploit - A PowerShell Post-Exploitation Framework
This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Linux privilege escalation auditing tool
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
Privilege Escalation Project - Windows / Linux / Mac