Stars
This repo was created to isolate all the code and resources for the CS7.1 Version
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.
A simple build script for new Kali images.
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
Inject remote template link into word document for remote template injection
Build your personal knowledge base with TriliumNext Notes
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
All the deals for InfoSec related software/tools this Black Friday
🔍 gowitness - a golang, web screenshot utility using Chrome Headless
Chris Titus Tech's Windows Utility - Install Programs, Tweaks, Fixes, and Updates
An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution
Covenant is a collaborative .NET C2 framework for red teamers.
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Advanced keyboard-walk generator with configureable basechars, keymap and routes
Cobalt-Strike / ElevateKit
Forked from rsmudge/ElevateKitThe Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
Public repository based on official releases. This repository is *not* used for active development. Do *not* submit pull requests.
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!
Chameleon: A tool for evading Proxy categorisation
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.