Stars
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A collection of manifests that will create pods with elevated privileges.
Loads any C# binary in mem, patching AMSI + ETW.
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Modern VNC Server and client, web based and secure
π gowitness - a golang, web screenshot utility using Chrome Headless
Peirates - Kubernetes Penetration Testing tool
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground π
π¦ | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
"Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.
BloodyAD is an Active Directory Privilege Escalation Framework
StandIn is a small .NET35/45 AD post-exploitation toolkit
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
All about bug bounty (bypasses, payloads, and etc)
Find, verify, and analyze leaked credentials
i will upload more templates here to share with the comunity.
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer
Security Tool to Look For Interesting Files in S3 Buckets