Stars
A fork of the great TokenTactics with support for CAE and token endpoint v2
PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirectory module (ADWS) or System.DirectoryServices class (LDAP).
This repository is a collection of powershell functions every hacker should know
A script that helps you understand why your E-Mail ended up in Spam
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…
Tools and Techniques for Blue Team / Incident Response
This repository of PowerShell sample scripts show how to access Intune service resources. They demonstrate this by making HTTPS RESTful API requests to the Microsoft Graph API from PowerShell.
Lightweight fuzzing of a memory snapshot using KVM
Mac setup and configuration via Ansible.
J-Run / dnschef
Forked from iphelix/dnschefDNSChef - DNS proxy for Penetration Testers and Malware Analysts [CSUBNET]
Directory Services Internals (DSInternals) PowerShell Module and Framework
Sysmon EDR POC Build within Powershell to prove ability.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Tools & Interesting Things for RedTeam Ops
This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC architecture.
Azure Security Resources and Notes
An advanced memory forensics framework
Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool
C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Examples repo for my "8 ways to spy your consoles" talk @ ZeroNights 2021
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
A tiling window manager for macOS based on binary space partitioning
Password Hunter in Active Directory
This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests and bug bounty.
An information security preparedness tool to do adversarial simulation.
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️