MaxRozendaal's Stars
AndrewWalsh/openapi-devtools
Browser extension that generates API specs for any app or website
itm4n/PrivescCheck
Privilege Escalation Enumeration Script for Windows
lkarlslund/Adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
netero1010/EDRSilencer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
folke/twilight.nvim
🌅 Twilight is a Lua plugin for Neovim 0.5 that dims inactive portions of the code you're editing using TreeSitter.
Mazars-Tech/AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
rasta-mouse/ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
blacklanternsecurity/MANSPIDER
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
nickvourd/Windows-Local-Privilege-Escalation-Cookbook
Windows Local Privilege Escalation Cookbook
dafthack/GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
The-Viper-One/PsMapExec
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
evilmog/ntlmv1-multi
NTLMv1 Multitool
HakonHarnes/img-clip.nvim
Effortlessly embed images into any markup language, like LaTeX, Markdown or Typst
ProcessusT/HEKATOMB
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
techspence/ScriptSentry
ScriptSentry finds misconfigured and dangerous logon scripts.
Z4kSec/Masky
Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory
Hackndo/pyGPOAbuse
Partial python implementation of SharpGPOAbuse
Leo4j/Amnesiac
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
benbrastmckie/.config
NeoVim configuration optimized for writing in LaTeX
skelsec/evilrdp
gabriellandau/EDRSandblast-GodFault
EDRSandblast-GodFault
Tw1sm/PySQLRecon
Offensive MSSQL toolkit written in Python, based off SQLRecon
lexfo/rpc2socks
Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Leo4j/Invoke-SessionHunter
Retrieve and display information about active user sessions on remote computers. No admin privileges required.
awsmhacks/awsmBloodhoundCustomQueries
Collection of cyphers for bloodhound
akamai/Invoke-DHCPCheckup
synacktiv/bbs
bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or chains of proxies based on the request's target. Routing can be configured with a PAC script (if built with PAC support), or through a JSON file.
Dramelac/GoldenCopy
Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.
morRubin/AzureADJoinedMachinePTC
Tool to perform lateral movement between AAD joined devices
nickvourd/Responder-Parser
Most Responder's configuration power in your hand.