Skip to content
View vinegrep's full-sized avatar

Block or report vinegrep

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

An OSINT tool that helps detect members of a company with leaked credentials

Python 573 45 Updated Feb 18, 2025

Tamper Active Directory user attributes to collect their hashes with MS-SNTP

PowerShell 24 2 Updated Jan 21, 2025

Payload development framework

Python 702 104 Updated Feb 22, 2025

USB Army Knife – the ultimate close access tool for penetration testers and red teamers.

JavaScript 1,305 118 Updated Mar 9, 2025

Hardening Active Directory version 2

PowerShell 305 46 Updated Jan 4, 2025

sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment

YARA 571 64 Updated Feb 16, 2025

The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.

C 145 11 Updated Nov 11, 2024

MLOps Attack Toolkit

C# 16 5 Updated Jan 6, 2025

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading

Rust 253 27 Updated Sep 26, 2024

Awesome EDR Bypass Resources For Ethical Hacking

1,104 113 Updated Jan 29, 2025

Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies

C# 227 25 Updated Dec 27, 2024

Situational Awareness script to identify how and where to run implants

Python 45 8 Updated Dec 6, 2024

IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations

C++ 986 89 Updated Mar 6, 2025

Complete list of LPE exploits for Windows (starting from 2023)

C 754 103 Updated Feb 27, 2025

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 492 82 Updated Mar 2, 2025

C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.

Go 371 42 Updated Jan 15, 2025

An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution

C 181 27 Updated Nov 27, 2024

A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.

Go 553 41 Updated Mar 5, 2025

.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation

C# 274 33 Updated Nov 3, 2024

A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID

PowerShell 434 51 Updated Mar 7, 2025

Configuration files for the SOF-ELK VM

Shell 1,556 289 Updated Feb 23, 2025

EDR & Antivirus Bypass to Gain Shell Access

C# 233 44 Updated Sep 30, 2024

Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without relying on event logs

C# 186 17 Updated Oct 6, 2024

Publications from Trail of Bits

Python 1,529 185 Updated Mar 7, 2025

PoC for the Untrusted Pointer Dereference in the ks.sys driver

C 275 59 Updated Nov 29, 2024

Bypass LSA protection using the BYODLL technique

C 154 33 Updated Sep 21, 2024

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities

Python 654 86 Updated Oct 26, 2024
Next