daddycocoaman's Stars
Malcrove/SeamlessPass
A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO
indianajson/can-i-take-over-dns
"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.
darrenburns/rich-pixels
A Rich-compatible library for writing pixel images and ASCII art to the terminal.
EvanMcBroom/lsa-whisperer
Tools for interacting with authentication packages using their individual message protocols
darrenburns/posting
The modern API client that lives in your terminal.
Textualize/textual-serve
Serve Textual apps locally
ChrisBuilds/terminaltexteffects
TerminalTextEffects (TTE) is a terminal visual effects engine, application, and Python library.
praetorian-inc/noseyparker
Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
decoder-it/ADCSCoercePotato
The-Z-Labs/bof-launcher
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
tree-sitter/tree-sitter
An incremental parsing system for programming tools
indygreg/python-build-standalone
Produce redistributable builds of Python
Aetsu/OffensivePipeline
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
eleemosynator/writeups
Write-ups for crackmes and CTF challenges
iann0036/azure.permissions.cloud
A crowdsourced Azure RBAC permissions reference.
SpecterOps/BloodHound
Six Degrees of Domain Admin
vlang/wasmer
NetSPI/FuncoPop
Tools for attacking Azure Function Apps
eliasdorneles/upiano
A Piano in your terminal
doyensec/wsrepl
WebSocket REPL for pentesters
ynkdir/py-win32more
Python bindings for Win32 API generated from win32metadata.
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
modularml/mojo
The Mojo Programming Language
fortalice/modifyCertTemplate
ADCS cert template modification and ACL enumeration
xforcered/Windows_LPE_AFD_CVE-2023-21768
LPE exploit for CVE-2023-21768
Shell-Company/QRExfil
This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visually allowing exfiltration of data in air gapped systems
chvancooten/NimPlant
A light-weight first-stage C2 implant written in Nim.
Jeffail/gabs
For parsing, creating and editing unknown or dynamic JSON in Go
khchen/winim
Windows API, COM, and CLR Module for Nim
byt3bl33d3r/NimDllSideload
DLL sideloading/proxying with Nim!