Lists (32)
Sort Name ascending (A-Z)
AI & LLM
Anonymous
APT
Asset Discovery
Brute Force
C2
Cloud Security
Coding
Content Retrieval
Defense Evasion
Detection & Response
Domain
EDR
Exploit
Forensic Analysis
Industrial
Infrastructure
IOT Security
Lateral Movement
Misc & Note
Network Topology
OSINT
Persistence
Pishing
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Rookit
Shell
System Information
Web Security
Wireless
Stars
Evil-M5Project is an innovative tool developed for ethical testing and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with Wi…
early cascade injection PoC based on Outflanks blog post
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
SubDroid
SharpSQLTools
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
Rust port of LayeredSyscall, designed to perform indirect syscalls while generating legitimate API call stack frames by abusing Vectored Exception Handling (VEH) to bypass user-land EDR hooks in Wi…
A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
Generates millions of keyword-based password mutations in seconds.
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Tool for extracting information from newly spawned processes
Zero shot vulnerability discovery using LLMs
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
In-depth repository of Telegram OSINT resources covering, tools, techniques & tradecraft.
Retrieve and display information about active user sessions on remote computers. No admin privileges required.
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
go
64-bit, position-independent implant template for Windows in Rust.