Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
Stars
Privilege Escalation Enumeration Script for Windows
An open source, self-hosted implementation of the Tailscale control server
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
Hide your Powershell script in plain sight. Bypass all Powershell security features
A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Python version of the C# tool for "Shadow Credentials" attacks
get things from one computer to another, safely
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
Servo aims to empower developers with a lightweight, high-performance alternative for embedding web technologies in applications.
Windows Privilege Escalation from User to Domain Admin.
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
A collaborative, multi-platform, red teaming framework
Rapidly initialize Windows Sanbox for malware analysis and reverse engineering
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Fully featured and community-driven hacking environment
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Binaries for the book Practical Malware Analysis
Utilities intended for use with Llama models.
Implements harmful/harmless refusal removal using pure HF Transformers