Stars
Find, verify, and analyze leaked credentials
📲 Enumerate information from an app based on the APK file
A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.
ScriptIdiot / AutoSmuggle
Forked from surajpkhetani/AutoSmuggleUtility to craft HTML smuggled files for Red Team engagements
ScriptIdiot / Upload_Bypass
Forked from sAjibuu/Upload_BypassA simple tool for bypassing file upload restrictions.
PowerShell Runspace Post Exploitation Toolkit
Run PowerShell with rundll32. Bypass software restrictions.
Android security insights in full spectrum.
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
A simple zero-configuration command-line http server for uploading files.
Escaping Restricted Environments and Bypassing DLP
This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially useful when dealing with PowerShell commands containing character…
Most advanced and poorly coded windows batch obfuscator ever made (aka the best)
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
Python default webserver as an windows executable
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Project to implement and automate juice jacking: the stealing of phone data through USB connections
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript
Windows Local Privilege Escalation Cookbook
ScareCrow - Payload creation framework designed around EDR bypass.
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).