List of Repositories
☆102Oct 22, 2021Updated 4 years ago
Alternatives and similar repositories for repos
Users that are interested in repos are comparing it to the libraries listed below
Sorting:
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Various Payload wordlists☆240Apr 26, 2025Updated 10 months ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Use grepaddr to extract (grep) all kinds of addresses from stdin like URLs (incl. IPv4/IPv6), IP addresses & ranges (IPv4/IPv6), e-mail a…☆66Aug 7, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 5 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Dec 5, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106May 25, 2020Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- Fast and intuitive manager for multiple reverse shells☆86Dec 7, 2024Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- A basic golang server/client for distributing tasks over multiple systems.☆39Jul 20, 2020Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- ☆37May 8, 2022Updated 3 years ago
- ☆60Mar 28, 2020Updated 5 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago