Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View zpaav's full-sized avatar

Highlights

  • Pro

Block or report zpaav

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).

Python 25 7 Updated Jan 2, 2026

OSCP Cheat Sheet

PowerShell 3,598 755 Updated Dec 29, 2025

fully accessible cross-browser HTML5 media player.

JavaScript 794 230 Updated Jan 16, 2026

Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence

Python 413 72 Updated Nov 7, 2025

A lightweight tool for deploying and managing containerised applications across a network of Docker hosts. Bridging the gap between Docker and Kubernetes ✨

Go 4,499 116 Updated Jan 13, 2026
Python 30 1 Updated Nov 5, 2025

Helm charts for running open source digital forensic tools in Kubernetes

Smarty 178 20 Updated Jan 16, 2026

Detonate malware on VMs and get logs & detection status

C# 76 7 Updated Jan 14, 2026

The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.

Rust 432 41 Updated Jan 4, 2026

Bluesky PDS (Personal Data Server) container image, compose file, and documentation

Shell 2,318 271 Updated Jan 16, 2026

Distributed malware processing framework based on Python, Redis and S3.

Python 460 49 Updated Dec 1, 2025

Research PoC demonstrating Linux Kernel hooking plus defences.

Python 29 3 Updated Jan 7, 2026

A high-speed forensic timeline engine for Windows forensic artifact CSV output built for DFIR investigators. Quickly consolidate CSV output from processed triage evidence for Eric Zimmerman (EZ Too…

C# 293 33 Updated Nov 6, 2025

Enumerate active EDR's on the system

C 148 26 Updated Sep 23, 2025

A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.

Go 256 22 Updated Sep 23, 2025

A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.

Go 138 13 Updated Nov 14, 2025
Python 152 27 Updated Oct 2, 2025

A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.

JavaScript 962 52 Updated Dec 12, 2025

Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act on them: block, reroute, tarpit, or deceive in real time.

Go 285 19 Updated Dec 6, 2025

Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used to setup Dynamic Application Security Testing (DAST).

Python 294 47 Updated Sep 2, 2025
Python 134 14 Updated Sep 9, 2025

Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit

HTML 324 74 Updated Oct 25, 2025

Certified Red Team Operator (CRTO) Cheatsheet and Checklist

201 39 Updated Mar 16, 2024

An automated NMAP python script

Python 48 10 Updated Feb 15, 2025

A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.

PowerShell 866 86 Updated Jan 15, 2026

Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.

C 120 8 Updated Nov 5, 2025

Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges

Python 173 11 Updated Aug 13, 2025

SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.

Python 156 42 Updated Jan 8, 2026

Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

C 357 56 Updated Aug 29, 2025

C2 writen in Rust & Go powered by Tor network.

Vue 155 16 Updated Oct 30, 2025
Next