1. WmicmdA command shell wrapper using only WMI for Microsoft Windows
3. UmapThe USB host security assessment tool
4. Idahuntidahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro
7. KeimpxCheck for valid credentials across a network over SMB
8. Umap2Umap2 is the second revision of NCC Group's python based USB host security assessment tool.
9. AsatoolsMain repository to pull all NCC Group Cisco ASA-related tool projects.
13. SolitudeSolitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
17. BlackboxprotobufBlackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.
20. BinproxyBinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.
22. TcpproxA small command-line TCP proxy utility written in Python
23. ScryingA tool for collecting RDP, web and VNC screenshots all in one place
24. Scout2Security auditing tool for AWS environments
26. Lazydroidbash script to facilitate some aspects of an Android application assessment
27. BlesuiteBLESuite is a Python package that provides an easier way to test Bluetooth Low Energy (BLE) device
30. TpmgenieTPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
31. GtfoblookupOffline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io) and LOLBAS (https://github.com/LOLBAS-Project/LOLBAS)
34. GitpwndGitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines
35. CarnivoreTool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb
39. Ble ReplayBLE-Replay is a Bluetooth Low Energy (BLE) peripheral assessment tool
41. WhalescanWhalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerable packages on the container
43. HashcrackGuesses hash types, picks some sensible dictionaries and rules for hashcat
45. RftmNCC Group Open Source RF Security Testing Methodology
46. XendbgA feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermichaels/xendbg.
48. Cachegraba tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores
50. FenrirPoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels