Skip to content
View stishy's full-sized avatar

Block or report stishy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)

C 195 19 Updated Feb 6, 2025

Open-source multi-purpose remote access tool for Microsoft Windows

Pascal 192 27 Updated Feb 13, 2026

Project for tracking publicly disclosed DLL Hijacking opportunities.

885 112 Updated Feb 3, 2026

Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.

C 573 55 Updated Oct 27, 2025

BOF to steal browser cookies & credentials

C 497 46 Updated Feb 10, 2026

Library of BOFs to interact with SQL servers

C 222 29 Updated Dec 3, 2025

Shark Jack payloads for testing exposed RJ45 (ethernet) ports and dealing with port security.

Shell 9 1 Updated Sep 7, 2024

The different ways to dump lsass

C 263 34 Updated Aug 15, 2025

Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully…

C# 325 39 Updated Oct 20, 2025

Some POCs for my BYOVD research and find some vulnerable drivers

Rust 1 Updated May 28, 2025

Shellcode encryptor using a substitution cipher with a randomly generated key.

Rust 141 24 Updated Jan 18, 2025

Some of my personal notes that helped me pass the OSWP

60 12 Updated May 15, 2022

ScriptSentry finds misconfigured and dangerous logon scripts.

PowerShell 622 54 Updated Dec 20, 2024

C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.

C# 431 76 Updated Sep 1, 2024

Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

JavaScript 2,232 284 Updated Feb 25, 2023

Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.

PowerShell 239 35 Updated Oct 14, 2024

Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.

Python 98 34 Updated Sep 27, 2025

Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.

C++ 809 97 Updated Sep 3, 2024

This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.

Python 2,417 448 Updated Jan 13, 2026

SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.

Python 886 114 Updated Feb 13, 2026

Timeroasting scripts by Tom Tervoort

Python 385 44 Updated Nov 11, 2025

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 586 61 Updated Mar 19, 2024

Remote command line LSASS extractor

Python 33 5 Updated Aug 25, 2025

Identifies the bytes that Microsoft Defender flags on.

C# 2,578 473 Updated Dec 31, 2025

OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.

C# 819 151 Updated Oct 27, 2023

a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )

C# 2,724 261 Updated Feb 2, 2026

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

PowerShell 5,034 671 Updated Feb 8, 2026

AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses

JavaScript 1,471 158 Updated Jan 23, 2026

Dominate Active Directory with PowerShell.

PowerShell 1,161 121 Updated Nov 28, 2025
Next