Lists (8)
Sort Name ascending (A-Z)
Stars
CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices
A tool to exploit .NET Remoting Services
Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP
This code silently installs Chrome extensions on MacOS and Windows
Command line tool for dumping Jenkins credentials.
wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP
Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintain stealth and robust OPSEC.
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
xforcered / SCMKit
Forked from h4wkst3r/SCMKitSource Code Management Attack Toolkit
An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables executable content to be executed from any memory location without…
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
Remotely perform actions on DisableRestrictedAdmin reg key
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.
Small toolkit for extracting information and dumping sensitive strings from Windows processes
Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls, Event Tracing for Windows (ETW) suppression, process hollo…
A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks