Lists (6)
Sort Name ascending (A-Z)
Stars
Linux enumeration tool for pentesting and CTFs with verbosity levels
Dump Kerberos tickets from the KCM database of SSSD
Fully featured and community-driven hacking environment
ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overflow vulnerabilities, and memory leaks.
Tool to audit and attack LAPS environments
SherlockFS / SherlockFS
Forked from nathan-rabet/cryptFSAn Encrypted Filesystem
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It ca…
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be r…
.NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Arsenal is just a quick inventory and launcher for hacking programs