Kali configuration optimized for red teaming/pentesting/CTFs
☆20Oct 20, 2023Updated 2 years ago
Alternatives and similar repositories for linuxconfig
Users that are interested in linuxconfig are comparing it to the libraries listed below
Sorting:
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- really ?☆12Feb 29, 2024Updated last year
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- ☆14Jul 10, 2025Updated 7 months ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- xilinx_cfg☆20Jul 8, 2024Updated last year
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- Packer is a compact, fast and crosss-platform serialization library for store data in a buffer☆22Aug 5, 2023Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Mar 2, 2024Updated last year
- Tool to extract powerful tokens from Office desktop apps memory☆74Mar 1, 2024Updated last year
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- A terminal UI to monitor and query Elasticsearch.☆12May 10, 2024Updated last year
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Jan 31, 2020Updated 6 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Jun 4, 2019Updated 6 years ago
- Some scripts to support with importing large datasets into BloodHound☆82Nov 28, 2023Updated 2 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- ☆10Updated this week
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- ReVBShell - Reverse VBS Shell☆84Oct 22, 2025Updated 4 months ago
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago