Lists (31)
Sort Name ascending (A-Z)
ai
Android
blockchain
Blue Team
Cloud
Crypto
devops
devrust
DFIR
driver
Evasion
For Dev go
For GobypassAV dev
hardening
knowledge
Kubernetes
Lab
maldev
Mobile
OSINT
Pentest Tools
Pentest Tools internal
For internal pentest or redteamPhishing
Purple team
R&D
RAG
red team
reverse
Tools sysadmin
Vuln & PoC
Web
Starred repositories
wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP
Run a program as TrustedInstaller (SYSTEM)
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
Api for fetching transcripts from youtube videos written in go
Deception implementation through analysis of BloodHound data
IPSpinner works as a local proxy that redirects requests through external services.
A collection of guides and examples for the Gemma open models from Google.
The Security Toolkit for LLM Interactions
An open-source AI agent that brings the power of Gemini directly into your terminal.
A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications. This can be done without requiring access to SCCM server.
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
The simplest way to protect your apps with a login screen.
Scripts to build a trimmed-down Windows 11 image.
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
Firefly III: a personal finances manager
Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.
The Fully Customizable Desktop Environment for Windows 10/11.
Weaponize DLL hijacking easily. Backdoor any function in any DLL.
Dump Azure AD Connect credentials for Azure AD and Active Directory
Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or even inspiration).
CasaOS - A simple, easy-to-use, elegant open-source Personal Cloud system.
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
The easiest, and most secure way to access and protect all of your infrastructure.
A tool for coercing and relaying Kerberos authentication over DCOM and RPC.
A cross-platform, fast and extensible general purpose fuzzy finder 📺