Lists (19)
Sort Name ascending (A-Z)
Stars
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
XSerum is a powerful web attack payload generator designed for red teamers, ethical hackers, and researchers. It supports a wide range of attack types including XSS, CSRF, HTML Injection, CSP Bypas…
.NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS
Workshop designed to introduce students to malware dev
rootkit-io / malware-and-exploitdev-resources
Forked from evilbuffer/malware-and-exploitdev-resourcesOrganized list of my malware development resources
Thor Artifacts for Velociraptor
Ransomware simulator written in Golang
A toolset to make a system look as if it was the victim of an APT attack
Pack/Encrypt/Obfuscate ELF + SHELL scripts
Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, groups objects, GPOs and network shares required. It also ad…
Installs ADDS and configures a vulnerable domain via a powershell script
Transparent proxy through Tor for Kali Linux OS
Starkiller is a Frontend for PowerShell Empire.
A swiss army knife for pentesting networks
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive …
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates timelines, and detects suspicious activities.