Lists (1)
Sort Name ascending (A-Z)
Stars
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
🔥📜 Forbidden collection of Red Team sorcery 📜🔥
A community-driven collection of BloodHound queries
Neo4jWordlistHarvester but then with bloodhound json files
Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…
Lists who can read any gMSA password blobs and parses them if the current user has access.
Tool to remotely dump secrets from the Windows registry
A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active Directory
Simple (relatively) things allowing you to dig a bit deeper than usual.
Tw1sm / pyldapsearch
Forked from fortalice/pyldapsearchTool for issuing manual LDAP queries which offers bofhound compatible output
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.
Situational Awareness commands implemented using Beacon Object Files
Pack/Encrypt/Obfuscate ELF + SHELL scripts
A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.
Deloitte-OffSecResearch / Certipy
Forked from ly4k/CertipyTool for Active Directory Certificate Services enumeration and abuse
A centralized resource for previously documented WDAC bypass techniques
Cameradar hacks its way into RTSP videosurveillance cameras