Prosouth's Stars
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
rebootuser/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
RPISEC/MBE
Course materials for Modern Binary Exploitation by RPISEC
infosecn1nja/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Veil-Framework/Veil
Veil 3.1.X (Check version info in Veil at runtime)
RPISEC/Malware
Course materials for Malware Analysis by RPISEC
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
leebaird/discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
DataSploit/datasploit
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
ElevenPaths/FOCA
Tool to find metadata and hidden information in the documents.
Bo0oM/fuzz.txt
Potentially dangerous files
logstash-plugins/logstash-patterns-core
jesparza/peepdf
Powerful Python tool to analyze PDF documents
alphasoc/flightsim
A utility to safely generate malicious network traffic patterns and evaluate controls.
pentestmonkey/unix-privesc-check
Automatically exported from code.google.com/p/unix-privesc-check
sagishahar-zz/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
l0ss/Grouper
A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)
mthbernardes/GTRS
GTRS - Google Translator Reverse Shell
magoo/redteam-plan
Issues to consider when planning a red team exercise.
gladiatx0r/Powerless
Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind
ANSSI-FR/bmc-tools
RDP Bitmap Cache parser
two06/Inception
Provides In-memory compilation and reflective loading of C# apps for AV evasion.
nbulischeck/tyton
Kernel-Mode Rootkit Hunter
beave/sagan
** README ** This repo has MOVED to https://github.com/quadrantsec/sagan
certsocietegenerale/event2timeline
Simple Microsoft Windows sessions event logs visualization
reider-roque/pentest-tools
Penetration testing scripts
treussart/ProbeManager
Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...
tmr232/ida_ipython
An IDA Pro Plugin for embedding an IPython Kernel