Lists (27)
Sort Name ascending (A-Z)
Active Directory
Tools for hacking Active Directory networksAerospace
Aerospace (hacking) resourcesCloud
Repositories related to cloud hackingCommand & Control
Command & Control (C2) tools and frameworksCredentials
Tools to work with all sorts of credentialsCryptography
Tools highlighting cryptographic attacksCVE
Proof-of-concept programs associated with Common Vulnerabilities and Exposures (CVE)Evasion
Tools & Resources for evading Antivirus, EDR, IDS, etc.Forensics
Tools for forensic operations / CTFsHardware
Collection of repositories related to hardware (hacking)IoT
Tools for testing Internet of Things (IoT) devicesLinux
Tools related to hacking all things LinuxMobile
Resources related to hacking or reversing mobile devices or mobile apps.Network
Tools for general network hackingOperational Technology
Resources related to (hacking) Operational Technology (OT) systemsOSINT
Resources for open source intelligence (OSINT)Other
Unsorted stars / other stuffPivoting
Tools to pivot through internal networksPost exploitation
Repositories with post-exploitation toolingPrivilege Escalation
Resources for privilege escalation, usually on an OS-basisPwn
Tools for binary exploitation (AKA pwn)Reporting
Tools for writing pentest / red team reportsReversing
All things digital reverse engineeringSocial Engineering
Repositories that highlight attacks that deal with victim interaction (phishing, general tomfoolery)Web
Tools & resources for hacking web applicationsWindows
Tools related to (hacking) Microsoft Windows OSWireless
Wireless hacking (WiFi, Bluetooth, BLE, ...)Starred repositories
Raspberry Pi: development platform for PlatformIO
GCC Cross-compiler chain for Raspberry Pi Pico
Depix is a PoC for a technique to recover plaintext from pixelized screenshots.
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks
Local Privilege Escalation to Root via Sudo chroot in Linux
Self-developed tools for Lateral Movement/Code Execution
Tool to enumerate privileged Scheduled Tasks on Remote Systems
Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s …
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
Lateral Movement Using DCOM and DLL Hijacking
Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.
Lateral Movement technique using DCOM and HTA
Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.
From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any changes to the source code.
Offline, privacy-first grammar checker. Fast, open-source, Rust-powered
Python library to perform fault-injection attacks on microcontrollers
Up-to-date simple useragent faker with real world database