Menn1s's Stars
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
initialcommit-com/git-sim
Visually simulate Git operations in your own repos with a single terminal command.
knavesec/Max
Maximizing BloodHound. Max is a good boy.
Proviesec/google-dorks
Useful Google Dorks for WebSecurity and Bug Bounty
ly4k/PassTheChallenge
Recovering NTLM hashes from Credential Guard
ARPSyndicate/awesome-intelligence
A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources
Slackadays/Clipboard
😎🏖️🐬 Your new, 𝙧𝙞𝙙𝙤𝙣𝙠𝙪𝙡𝙞𝙘𝙞𝙤𝙪𝙨𝙡𝙮 smart clipboard manager
wavestone-cdt/EDRSandblast
pwn1sher/frostbyte
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
med0x2e/ExecuteAssembly
Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash).
tremwil/ds3-nrssr-rce
Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.
zyn3rgy/LdapRelayScan
Check for LDAP protections regarding the relay of NTLM authentication
dirkjanm/krbrelayx
Kerberos unconstrained delegation abuse toolkit
rsmudge/unhook-bof
Remove API hooks from a Beacon process.
DataDog/stratus-red-team
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
optiv/Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
corkami/collisions
Hash collisions and exploitations
rootsecdev/Azure-Red-Team
Azure Security Resources and Notes
xforcered/InvisibilityCloak
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
xforcered/CredBandit
Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel
evilashz/CheeseOunce
Coerce Windows machines auth via MS-EVEN
SecurityRiskAdvisors/msspray
Password attacks and MFA validation against various endpoints in Azure and Office 365
BishopFox/eyeballer
Convolutional neural network for analyzing pentest screenshots
mandiant/Azure_Workshop
electron/asar
Simple extensive tar-like archive format with indexing
icyguider/Shhhloader
Syscall Shellcode Loader (Work in Progress)
pathtofile/Sealighter
Sysmon-Like research tool for ETW
p0dalirius/windows-coerced-authentication-methods
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
zeronetworks/rpcfirewall
indygreg/PyOxidizer
A modern Python application packaging and distribution tool