NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+21125%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+2950%)
Deploy DeceptionA PowerShell module to deploy active directory decoy objects.
Stars: ✭ 109 (+289.29%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (+1396.43%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+1453.57%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+101932.14%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+2550%)
Crossc2generate CobaltStrike's cross-platform payload
Stars: ✭ 512 (+1728.57%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (+1132.14%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (+1503.57%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+1478.57%)
FoureyeAV Evasion Tool For Red Team Ops
Stars: ✭ 421 (+1403.57%)
WaffleEnable drop-in Windows Single Sign On for popular Java web servers.
Stars: ✭ 381 (+1260.71%)
Luwu红队基础设施自动化部署工具
Stars: ✭ 539 (+1825%)
Pidense🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Stars: ✭ 358 (+1178.57%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (+2792.86%)
Redteam ResearchCollection of PoC and offensive techniques used by the BlackArrow Red Team
Stars: ✭ 330 (+1078.57%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+1685.71%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+2317.86%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+1682.14%)
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+13507.14%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (+821.43%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+1528.57%)
Browserghost这是一个抓取浏览器密码的工具,后续会添加更多功能
Stars: ✭ 559 (+1896.43%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+2660.71%)
Repo SupervisorScan your code for security misconfiguration, search for passwords and secrets. 🔍
Stars: ✭ 482 (+1621.43%)
BadAssMacrosBadAssMacros - C# based automated Malicous Macro Generator.
Stars: ✭ 281 (+903.57%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+1439.29%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+21953.57%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+1396.43%)
Rootkits List DownloadThis is the list of all rootkits found so far on github and other sites.
Stars: ✭ 815 (+2810.71%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+1264.29%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+117432.14%)
GpozaurrGroup Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.
Stars: ✭ 381 (+1260.71%)
Poshc2A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Stars: ✭ 747 (+2567.86%)
RidrelayEnumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
Stars: ✭ 359 (+1182.14%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+1639.29%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (+1167.86%)
PwndropSelf-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Stars: ✭ 878 (+3035.71%)
TtpsTactics, Techniques, and Procedures
Stars: ✭ 335 (+1096.43%)
SlackpirateSlack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Stars: ✭ 512 (+1728.57%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (+1075%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+2489.29%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (+975%)
SharphoundThe Old BloodHound C# Ingestor (Deprecated)
Stars: ✭ 499 (+1682.14%)
PasscoreA self-service password management tool for Active Directory
Stars: ✭ 787 (+2710.71%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+857.14%)
PswinreportingThis PowerShell Module has multiple functionalities, but one of the signature features of this module is the ability to parse Security logs on Domain Controllers providing easy to use access to AD Events.
Stars: ✭ 575 (+1953.57%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+21435.71%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+3064.29%)
SimpleadadminLightweight tools for working with Active Directory users and groups. Also some domain discovery functions.
Stars: ✭ 9 (-67.86%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+2671.43%)
PezorOpen-Source PE Packer
Stars: ✭ 561 (+1903.57%)