Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View Marcuccio's full-sized avatar

Block or report Marcuccio

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today

33 4 Updated Sep 22, 2025

Python based GUI for browsing LDAP

Python 175 15 Updated Dec 7, 2025

Group Policy Objects manipulation and exploitation framework

Python 282 30 Updated Dec 7, 2025

Location-based techno with Sonic Pi and gpsd

Ruby 63 13 Updated Aug 20, 2015

Policy Module for Microsoft Active Directory Certificate Services

C# 245 30 Updated Aug 10, 2025

vet is a command-line tool that acts as a safety net for the risky curl | bash pattern. It lets you inspect, diff against previous versions, and lint remote scripts before asking for your explicit …

Shell 974 21 Updated Aug 20, 2025

Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!

Ruby 1,834 229 Updated Dec 15, 2025

Automating the MITM attack on WSUS

Python 280 31 Updated Nov 5, 2025

CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications

Go 1,753 149 Updated Jun 15, 2025

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]

PowerShell 7,435 1,335 Updated Oct 16, 2025

Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab

PowerShell 2,237 433 Updated Apr 12, 2024

game of active directory

PowerShell 7,241 1,012 Updated Jul 16, 2025

Tools and Techniques for Red Team / Penetration Testing

7,996 1,095 Updated Mar 18, 2025

Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit

HTML 315 68 Updated Oct 25, 2025

PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.

PowerShell 953 109 Updated Oct 15, 2025

A wrapper around grep, to help you grep for things

Go 2,051 335 Updated Jun 8, 2024

Collection of scripts to retrieve stored passwords from Veeam Backup

Python 141 34 Updated Jun 3, 2025

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities

Python 692 93 Updated Oct 26, 2024

Compiled Binaries for Ghostpack

1,559 261 Updated Oct 24, 2024

Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.

Python 87 29 Updated Aug 28, 2024

Python 3 tool to view and edit PostgreSQL filenodes

Python 7 Updated Feb 6, 2024

A monster cheatsheet on MITM attacks

368 37 Updated May 31, 2025

Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)

Python 90 17 Updated Jun 13, 2024

Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…

C# 3,883 282 Updated Dec 19, 2025

SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.

Shell 2,292 221 Updated Jul 27, 2025

BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability resea…

Shell 628 67 Updated Aug 29, 2025

AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses

JavaScript 1,458 155 Updated Mar 12, 2025

The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!

Shell 4,313 711 Updated Sep 30, 2024

Use ESC1 to perform a makeshift DCSync and dump hashes

Python 209 24 Updated Nov 2, 2023

Active Directory certificate abuse.

C# 1,875 269 Updated Oct 27, 2025
Next