Stars
GUI Tool for WSL/Linux to export webpages to .zim
Curated list of lightweight native macOS apps built with Swift, SwiftUI & AppKit. Best native Mac applications for productivity, development & utilities. No Electron bloat. ⭐
Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specifically used for phishing and IA operations.
attacksurge / ax
Forked from pry0cc/axiomThe Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbitrary binaries and scripts using any of our nine supported cl…
🛡️ Open-source binary protection toolkit for Windows PE. Nanomite, VM protection, anti-debug, and more.
Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!
Turns any rooted phone into the legendary USB Rubber Ducky. Android USB HID Keystroke Injector
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
Convert .reg to registry hive and reciprocally, without elevation
executing shellcode directly from a python variable
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
Proxifier Alternative to redirect any Windows/MacOS TCP and UDP traffic to HTTP/Socks5 proxy
Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.
Chisel new generation, written in rust. SSH under WSS with some customization.
Open Source Implementation of Cobalt Strike's Malleable C2
A self-hosted, real-time collaborative workspace for offensive security assessments.
Advanced Windows authentication token extraction and decryption tool for red team operations and security research
Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.
A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.
Modular C2 framework aiming to ease post exploitation for red teamers.
A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuffer calls. It suspends the target’s threads, patches the fun…