Lists (30)
Sort Name ascending (A-Z)
AI & LLM
Anonymous
APT
Asset Discovery
Brute Force
C2
Cloud Security
Code Audit
Coding
Defense Evasion
Detection & Response
Discovery & Collection
Domain
Forensic Analysis
ICS & IOT
Infrastructure
Lateral Movement
Misc & Note
OSINT
Persistence
Pishing
Post Exploitation
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Rookit
Shell
Vulnerability
Web Security
Wireless
Stars
psexecsvc - a python implementation of PSExec's native service implementation
Reverse Engineering: Decompiling Binary Code with Large Language Models
Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log refere…
.NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS
Automated Hosting Information Hunting Tool - Windows 主机信息自动化狩猎工具
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API
A PoC for Early Cascade process injection technique.
WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus …
An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of t…
Get IP address on other side audio call in Telegram.
Just some random Red Team Scripts that can be useful
ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native …
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
Collection of awesome LLM apps with AI Agents and RAG using OpenAI, Anthropic, Gemini and opensource models.
Tool to extract username and password of current user from PanGPA in plaintext