Lists (9)
Sort Name ascending (A-Z)
Stars
real time face swap and one-click video deepfake with only a single image
COM ViewLogger — new malware keylogging technique
Exploiting DLL Hijacking by DLL Proxying Super Easily
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
❗ Buffer Overflow Exploitation Examples
PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirectory module (ADWS) or System.DirectoryServices class (LDAP).
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement custom javascript. It then generates a relevant SVG.
Python implementation of GhostPack's Seatbelt situational awareness tool
Complete list of LPE exploits for Windows (starting from 2023)
The easiest way to run WireGuard VPN + Web-based Admin UI.
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
Nuitka is a Python compiler written in Python. It's fully compatible with Python 2.6, 2.7, 3.4-3.13. You feed it your Python app, it does a lot of clever things, and spits out an executable or exte…
Useful tool to track location or mobile number
This project aims to compare and evaluate the telemetry of various EDR products.
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework
Tools for Kerberos PKINIT and relaying to AD CS
Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies
Kernel mode WinDbg extension and PoCs for token privilege investigation.
Ask a TGS on behalf of another user without password
Octoscan is a static vulnerability scanner for GitHub action workflows.