d-quach's Stars
PowerShell/PowerShell
PowerShell for every system!
gentilkiwi/mimikatz
A little tool to play with Windows security
vxunderground/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
rbenv/rbenv
Manage your app's Ruby environment
jupyter/jupyter
Jupyter metapackage for installation, docs and chat
OJ/gobuster
Directory/File, DNS and VHost busting tool written in Go
BishopFox/sliver
Adversary Emulation Framework
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
HavocFramework/Havoc
The Havoc Framework
google/syzkaller
syzkaller is an unsupervised coverage-guided kernel fuzzer
BC-SECURITY/Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Velocidex/velociraptor
Digging Deeper....
ustayready/fireprox
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
vxunderground/VX-API
Collection of various malicious functionality to aid in malware development
Gerenios/AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
vxunderground/VXUG-Papers
Research code & papers from members of vx-underground.
CCob/SharpBlock
A method of bypassing EDR's active projection DLL's by preventing entry point exection
blacklanternsecurity/TREVORspray
TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!
iknowjason/PurpleCloud
A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
vxunderground/ThreatIntelligenceDiscordBot
Gets updates from various clearnet domains and ransomware threat actor domains
MarkoH17/Spray365
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
kavika13/RemCom
Remote Command Executor: A OSS replacement for PsExec and RunAs - or Telnet without having to install a server. Take your pick :)
Synzack/ldapper
3gstudent/msbuild-inline-task
Rezilion/mi-x
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
embee-research/Yara-detection-rules
Yara Rules for Modern Malware
kees/kernel-tools
Tools for doing upstream Linux kernel development, patch wrangling, builds, and testing
ibm-maximo-dev/maximo-scripting
Maximo Automation Scripting
boyddensmore/Maximo-Oracle-SQL-Public
A collection of Oracle SQL statements for IBM's Maximo (specifically designed for Control Desk, 7.5 and MAM 7.6)
fbsamples/caldera-security-tests
This project was created to provide examples of a TTP Runner and Security Regression Pipeline using vulnerabilities discovered in MITRE CALDERA by Jayson Grace from Meta's Purple Team.