Starred repositories
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b…
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
GRR Rapid Response: remote live forensics for incident response
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Tool for Active Directory Certificate Services enumeration and abuse
Interesting APT Report Collection And Some Special IOCs
A Python based ingestor for BloodHound
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-object dumping to NDJSON.
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.
Python Command-Line Ghidra Binary Diffing Engine
Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
Binary Ninja plugin to identify obfuscated code and other interesting code constructs
Dump NTDS with golden certificates and UnPAC the hash
DFIRTrack - The Incident Response Tracking Application
Collection of example YARA-L rules for use within Google Security Operations
Slack enumeration and exposed secrets detection tool
coffeegist / bofhound
Forked from fortalice/bofhoundGenerate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
Digital forensic acquisition tool for Windows based incident response.