A visual methodology tracking platform tailored for offensive security assessments
☆242Feb 10, 2026Updated last month
Alternatives and similar repositories for pwnflow
Users that are interested in pwnflow are comparing it to the libraries listed below
Sorting:
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Fast service fingerprinting CLI for 120+ protocols (TCP/UDP/SCTP) - built by Praetorian☆208Updated this week
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆77Oct 27, 2025Updated 4 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 9 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 2 weeks ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆470Jan 15, 2026Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆119Jan 30, 2026Updated last month
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,325Nov 12, 2025Updated 4 months ago
- ☆31Dec 5, 2024Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 9 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- A tool for automating network enumeration and reconnaissance☆18Jan 20, 2025Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 11 months ago
- An offensive data enrichment pipeline☆943Mar 10, 2026Updated last week
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆28Feb 4, 2026Updated last month
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated 2 years ago
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 3 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,175Dec 31, 2025Updated 2 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆140Mar 4, 2026Updated 2 weeks ago
- IPSpinner works as a local proxy that redirects requests through external services.☆113Mar 19, 2025Updated 11 months ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- ☆65Mar 15, 2024Updated 2 years ago