MartinIngesen's Stars
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
BishopFox/sliver
Adversary Emulation Framework
wpscanteam/wpscan
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com
DominicBreuker/stego-toolkit
Collection of steganography tools - helps with CTF challenges
matterpreter/DefenderCheck
Identifies the bytes that Microsoft Defender flags on.
Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
lukechilds/reverse-shell
Reverse Shell as a Service
mandiant/SharPersist
blacklanternsecurity/TREVORspray
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
dafthack/MSOLSpray
A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.
Flangvik/NetLoader
Loads any C# binary in mem, patching AMSI + ETW.
emtunc/SlackPirate
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
CompassSecurity/BloodHoundQueries
utkusen/shotlooter
a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
evilsocket/shellz
shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
ChrisTheCoolHut/PinCTF
Using Intel's PIN tool to solve CTF problems
p0dalirius/FindUncommonShares
FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.
Flangvik/AMSI.fail
C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
Flangvik/CobaltBus
Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus
Flangvik/AzureC2Relay
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
socprime/SigmaUI
SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)
plackyhacker/SandboxDefender
C# code to Sandbox Defender (and most probably other AV/EDRs).
trustedsec/User-Behavior-Mapping-Tool
mnemonic-no/grafeo
Open platform for modelling, collection and exchange of knowledge
netsecurity-as/subfuz
A subdomain fuzzing tool
jsecurity101/Marvel-Lab
A collection of Powershell scripts that will help automate the build process for a Marvel domain.
CCob/PwnyForm
tghack/tg18hack
jordanpotti/rt-reading
List of Red Team Resources