10000 tact1c1an (JB) / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View tact1c1an's full-sized avatar

Block or report tact1c1an

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking

C# 169 15 Updated Jun 27, 2025

🔥📜 Forbidden collection of Red Team sorcery 📜🔥

C 154 38 Updated Jun 10, 2025

Tail Certificate Transparency logs and extract hostnames

Go 92 8 Updated Jun 21, 2025

Automating the MITM attack on WSUS

Python 195 25 Updated Jun 28, 2025

A community-driven collection of BloodHound queries

Python 54 3 Updated Jun 20, 2025

Neo4jWordlistHarvester but then with bloodhound json files

Python 10 Updated Jun 10, 2025

Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.

Java 30 2 Updated Apr 7, 2025
Python 4 3 Updated Jun 28, 2025
PowerShell 183 17 Updated Jun 10, 2025

Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…

Python 8000 3,270 475 Updated Jan 24, 2025

Lists who can read any gMSA password blobs and parses them if the current user has access.

Python 305 52 Updated Feb 12, 2024

Make or Steal a Token

PowerShell 9 2 Updated Mar 20, 2024

TODO: Funny pun about visibility

TypeScript 186 13 Updated Jun 28, 2025

Tool to remotely dump secrets from the Windows registry

Go 468 51 Updated Jun 10, 2025

A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active Directory

Go 182 15 Updated Jun 2, 2025

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,374 547 Updated Mar 12, 2025

Tool for issuing manual LDAP queries which offers bofhound compatible output

Python 26 5 Updated Mar 2, 2025

A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.

C# 981 173 Updated Jul 26, 2021

SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.

C# 319 43 Updated May 24, 2025
PowerShell 183 18 Updated May 19, 2025

Situational Awareness commands implemented using Beacon Object Files

C 1,462 240 Updated Jun 25, 2025

Pack/Encrypt/Obfuscate ELF + SHELL scripts

Shell 317 38 Updated Jun 4, 2025

Ghosting-AMSI

PowerShell 200 33 Updated Apr 24, 2025

OAuth Device Code Phishing Toolkit

5CA4
Go 61 6 Updated Apr 25, 2025

A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.

PowerShell 239 14 Updated Jun 12, 2025

Tool for Active Directory Certificate Services enumeration and abuse

Python 2 3 Updated Feb 13, 2025

A centralized resource for previously documented WDAC bypass techniques

563 76 Updated May 15, 2025

Cameradar hacks its way into RTSP videosurveillance cameras

Go 4,434 554 Updated Oct 11, 2024
Next
0