Stars
Keyword monitoring tool for .onion sites — threat intelligence & brand monitoring
AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
AGENTS.md — a simple, open format for guiding coding agents
This tool helps inject code into the processes of Antivirus programs.
Autonomous Multi-Agent Based Red Team Testing Service / AI hacker
The Ultimate Collection of 900+ Agentic Skills for Claude Code/Antigravity/Cursor. Battle-tested, high-performance skills for AI agents including official skills from Anthropic and Vercel.
Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Agent.
A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for quick AD enumeration.
Fully featured and community-driven hacking environment
Self-hosted tunneling solution to expose localhost securely - unlimited bandwidth, no third-party servers
OmniProbe Scanner is a modern, all-in-one vulnerability assessment tool powered by Nmap, Nuclei, Katana, and Wapiti. Features a sleek React UI, deep crawling, real-time logs, and professional PDF r…
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞
A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.
Adversary simulation and Red teaming platform with AI
Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.
Advanced Windows authentication token extraction and decryption tool for red team operations and security research
[ARCHIVED] Evolved into BugTraceAI v2 — github.com/BugTraceAI/BugTraceAI
Gather results of dorks across a number of search engines
Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…
Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.