Pinned Repositories
All_NTLM_leak
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
awesome-cve-poc
✍️ A curated list of CVE PoCs.
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
BloodHound
Six Degrees of Domain Admin
BLUELAY
Searches online paste sites for certain search terms which can indicate a possible data breach.
caldera
An automated adversary emulation system
CheckPlease
Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
SEP_advanced_application_control
APPLICATION CONTROL RULES FOR DEFENDING AGAINST ADVANCED ATTACKS
steal_NTLM_ncat
Gl3bGl4z's Repositories
Gl3bGl4z/BLUELAY
Searches online paste sites for certain search terms which can indicate a possible data breach.
Gl3bGl4z/EDR-Testing-Script
Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter payloads
Gl3bGl4z/Exploits
Windows Exploits
Gl3bGl4z/fdiskyou-PowerOPS
Gl3bGl4z/Leak-NTLM-hash-via-HTML
List of HTML tags for leaking NTLM-hashes
Gl3bGl4z/LinuxAudit
Security Audit Script for Linux Systems
Gl3bGl4z/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Gl3bGl4z/post-exploitation
Post Exploitation Collection
Gl3bGl4z/red-team-scripts
A collection of Red Team focused tools, scripts, and notes
Gl3bGl4z/Task_Scheduler_ALPC
PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability
Gl3bGl4z/WindowsExploits
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.