Stars
BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack …
Generate an obfuscated DLL that will disable AMSI & ETW
smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares
Arsenal is just a quick inventory and launcher for hacking programs
Dettectinator - The Python library to your DeTT&CT YAML files.
The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifa…
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Elastic Security detection content for Endpoint
Parses Cobalt Strike malleable C2 profiles.
Warning lists to inform users of MISP about potential false-positives or other information in indicators
Covenant is a collaborative .NET C2 framework for red teamers.
🐧 Abuse of Google Colab for cracking hashes.
Identifies the bytes that Microsoft Defender flags on.
Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.
A collection of all the data i could extract from 1 billion leaked credentials from internet.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Credentials gathering tool automating remote procdump and parse of lsass process.
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
rasta-mouse / GadgetToJScript
Forked from med0x2e/GadgetToJScriptA tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
Red Teaming Tactics and Techniques
Change up a binary's embedded resources with this little creature.
Tool to find metadata and hidden information in the documents.