Stars
- All languages
- Arduino
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dart
- Dockerfile
- Eagle
- Erlang
- Go
- HCL
- HTML
- Hack
- Handlebars
- Inno Setup
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Sage
- Scala
- Scheme
- Shell
- Swift
- TeX
- TypeScript
- VBA
- Verilog
- Visual Basic
- Vue
- XSLT
- YARA
A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.
Advanced In-Memory PowerShell Process Injection Framework
tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it
Python alternative to Mimikatz lsadump::dcshadow
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
Decrypt SCCM and DPAPI secrets with Powershell.
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advanced phishing & payload infras
Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !
DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.
single-threaded event driven sleep obfuscation poc for linux
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.
A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.
Interactive CLI tool for exploiting LFI via PHP filter chaining — a wrapper around Synacktiv’s php_filter_chain_generator.
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Quark Agent - Your AI-powered Android APK Analyst
Self contained htaccess shells and attacks
Everything from my OSEP study.
Beacon Object File (BOF) to obtain Entra tokens via authcode flow.
Tools for interacting with authentication packages using their individual message protocols