NyaMeeEain's Stars
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
gophish/gophish
Open-Source Phishing Toolkit
1N3/Sn1per
Attack Surface Management Platform
mantvydasb/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
zer0yu/Awesome-CobaltStrike
List of Awesome CobaltStrike Resources
optiv/ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
dahall/Vanara
A set of .NET libraries for Windows implementing PInvoke calls to many native Windows APIs with supporting wrappers.
lockedbyte/CVE-2021-40444
CVE-2021-40444 PoC
threatexpress/domainhunter
Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
S3cur3Th1sSh1t/OffensiveVBA
This repo covers some code execution and AV Evasion methods for Macros in Office documents
Ne0nd0g/go-shellcode
A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.
mgeeky/cobalt-arsenal
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
noobpk/frida-ios-hook
A tool that helps you easy trace classes, functions, and modify the return values of methods on iOS platform
skahwah/SQLRecon
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
qsecure-labs/overlord
Overlord - Red Teaming Infrastructure Automation
anthemtotheego/InlineExecute-Assembly
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module
med0x2e/ExecuteAssembly
Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash).
GemGeorge/SniperPhish
SniperPhish - The Web-Email Spear Phishing Toolkit
cr-0w/maldev
⚠️ malware development
BC-SECURITY/Malleable-C2-Profiles
Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
outflanknl/PrintNightmare
b4rtik/RedPeanut
RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.
FuzzySecurity/Unix-PrivEsc
Local UNIX PrivEsc Aggregation
tonghuaroot/Awesome-macOS-Red-Teaming
List of Awesome macOS Red Teaming Resources.
tomcarver16/BOF-DLL-Inject
Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
BC-SECURITY/Offensive-VBA-and-XLS-Entanglement
GoSecure/xfsc
eXtensions for Financial Services (XFS) proof of concept client to explore and issue commands directly to the devices that support the protocol. Force ATMs to dispense cash if you have code execution on them.
tdjastrzebski/Vincenty-Excel
Thaddeus Vincenty's Direct and Inverse formulae for geodesic calculations in Excel (distance, azimuth, latitude, longitude).
mvelazc0/Invoke-SMBLogin
Validates username & password combination(s) across a host or group of hosts using the SMB protocol.