- Des Moines, IA
-
01:06
(UTC -06:00) - https://natesubra.com
- https://orcid.org/0009-0004-4683-0111
- @natesubra
- @natesubra@infosec.exchange
Highlights
- Pro
Lists (32)
Sort Name ascending (A-Z)
Blue Team
Bug Bounty
CI/CD
CLI
Cobalt Strike
Desktop_Apps
Detection
Development
Dubious
Exploit/POC
FlipperZero
Learning
Learning focused reposLinux
Low Code
ML
Note_Taking
OSINT
Password Cracking
Purple Team
Red Team
Red Team - AD
Red Team - Cloud
Remote_Control
Reporting
ReverseEngineering
RF
Selfhosted
Software
Threat_Hunting
WebAssembly
Windows
WSL
- All languages
- Assembly
- AutoIt
- Awk
- Batchfile
- Bicep
- Boo
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Crystal
- Dart
- Dockerfile
- Emacs Lisp
- Erlang
- Go
- Go Template
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MDX
- Makefile
- Nim
- Nix
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- PureBasic
- Python
- REXX
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- Svelte
- Swift
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
Simulation and red team Phishing Framework
A self-hosted, real-time collaborative workspace for offensive security assessments.
Convert .reg to registry hive and reciprocally, without elevation
Evasion kit for Cobalt Strike
Orchestrate Claude Code, Codex, and Gemini sessions on a multiplayer canvas. Manage git worktrees, track AI conversations, and visualize your team's agentic work in real-time.
A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.
A polyglot document intelligence framework with a Rust core. Extract text, metadata, and structured information from PDFs, Office documents, images, and 75+ formats. Available for Rust, Python, Rub…
Shellcode injection using the Windows Debugging API
The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacking.
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
Boilerplate to develop raw and truly Position Independent Code (PIC).
Fully automatic censorship removal for language models
Small utility to chunk up a large BloodHound JSON file into smaller files for importing.
Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to tools like …
PIC shellcode (C/C++) development toolkit designed for malware developers.
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
LibIPC is a simple Crystal Palace shared library for inter-process communication, based on Named Pipes.
Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload execution.
USB Army Knife – the ultimate close access tool for penetration testers and red teamers.
Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames
RhinoWAF – Fast, lightweight Web Application Firewall (WAF) for DDoS, XSS, SQLi, Layer 4/7 attacks. Open-source website & server security tool in Go.
A community-driven collection of BloodHound queries
A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow
Evade EDR's the simple way, by not touching any of the API's they hook.
A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit
Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does