Stars
Ghidra is a software reverse engineering (SRE) framework
"rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Azure Blob, Azure Files, Yandex Files
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Tools, tips, tricks, and more for exploring ICS Security.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
SharpUp is a C# port of various PowerUp functionality.
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Script for searching the extracted firmware file system for goodies!
MUCH Improved version of the Python Chasing Your Tail Tool to help you determine if you're being followed
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Arsenal is just a quick inventory and launcher for hacking programs
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
Directory Services Internals (DSInternals) PowerShell Module and Framework
Impacket is a collection of Python classes for working with network protocols.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Hide your Powershell script in plain sight. Bypass all Powershell security features
Loads any C# binary in mem, patching AMSI + ETW.
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
PowerSploit - A PowerShell Post-Exploitation Framework
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…
Identifies the bytes that Microsoft Defender flags on.