Stars
Personal collection of Bitburner scripts
Easily convert all of your Notability notes to PDF.
This is a fork of Amit Elazari's #legalbugbounty project at Berkley's CLTC, aimed at updating for real-world use.
Kali Linux Fixes for Newly Imported VM's
zimedev / certipy-merged
Forked from ly4k/CertipyTool for Active Directory Certificate Services enumeration and abuse
Tools and Techniques for Red Team / Penetration Testing
attacksurge / ax
Forked from pry0cc/axiomThe Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbitrary binaries and scripts using any of our nine supported cl…
HookChain: A new perspective for Bypassing EDR Solutions
This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.
A Security Tool for Bug Bounty, Pentest and Red Teaming.
A repository holding Proof of Concepts for executing the calculator application via different file formats
My very personal `dotfiles`. Do not clone them down and use my setup as is. This is my baby. However, feel free to take out bits and pieces.
Simulate the behavior of AV/EDR for malware development training.
A quick and dirty HTTP/S "organic" traffic generator.
A small x64 library to load dll's into memory.
MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.
Script to remove Windows 10 bloatware.
Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if you have popped a user's desktop and their outlook client.
Objective-C library and console to interact with Heimdal APIs for macOS Kerberos
A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
Bluecoat proxies URL filtering bypass PoC
Sandman is a NTP based backdoor for hardened networks.
ScareCrow - Payload creation framework designed around EDR bypass.
Docker configuration to quickly setup your own Canarytokens.
An extensible and easily configurable mining pool simulation framework
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.