-
NSA
- Fort Meade, Maryland
Highlights
- Pro
Lists (6)
Sort Name ascending (A-Z)
Stars
UAC Bypass using UIAccess program QuickAssist
Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads
A Python tool for discovering, downloading, and extracting metadata from publicly available files on target domains. Useful for OSINT.
A fork of the great TokenTactics with support for CAE and token endpoint v2
SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…
Crystal Palace library for proxying Nt API calls via the Threadpool
Dynamic shellcode loader with sophisticated evasion capabilities
Lateral Movement Bof with MSI ODBC Driver Install
Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different tests
The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
Windows protocol library, including SMB and RPC implementations, among others.
A curated knowledge base of techniques abusing legitimate web services for evasion, exfiltration, C2, and more.
Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.
xforcered / PhrackCTF
Forked from chompie1337/PhrackCTFBinary Exploitation Phrack CTF Challenge
Enhance Your Active Directory Password Spraying with User Intelligence.
A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
A tool to transform Chromium browsers into a C2 Implant
A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.