Stars
CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
LSASS memory dumper using direct system calls and API unhooking.
Research project for understanding how Mimikatz work and become better at C
xforcered / SoaPy
Forked from logangoins/SoaPySoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
Tool for Active Directory Certificate Services enumeration and abuse
BloodyAD is an Active Directory Privilege Escalation Framework
Tool to remotely dump secrets from the Windows registry
Just another Powerview alternative but on steroids
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Awesome EDR Bypass Resources For Ethical Hacking
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
Performing Indirect Clean Syscalls
This is the data that powers the PortSwigger URL validation bypass cheat sheet.
ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native executables.
psexecsvc - a python implementation of PSExec's native service implementation
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
A collection of pentest and development tips