Lists (1)
Sort Name ascending (A-Z)
Starred repositories
A collection of Azure AD/Entra tools for offensive and defensive security purposes
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
An even funnier way to disable windows defender. (through WSC api)
Network utility for sending / receiving TCP, UDP, SSL, HTTP
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Parses RecentFileCacheParser.bcf files
Official clone of PHP library to generate PDF documents and barcodes
AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10
A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
FastAPI framework, high performance, easy to learn, fast to code, ready for production
Tools for Kerberos PKINIT and relaying to AD CS
A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation ta…
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
AADInternals PowerShell module for administering Azure AD and Office 365
Protect your Domain Controllers by auditing and restricting LDAP requests
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
Privilege Escalation Enumeration Script for Windows