dev-2null
Penetration Tester | OSCP | OSCE | OSEP | AD Security Enthusiast | Allowed To Act On Behalf Of Other Identity
Forest
dev-2null's Stars
kmkz/PowerShell
Some .ps1 scripts for pentesting
nettitude/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
bcoles/kernel-exploits
Various kernel exploits
S3cur3Th1sSh1t/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
pkb1s/SharpAllowedToAct
Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)
samratashok/Deploy-Deception
A PowerShell module to deploy active directory decoy objects.
Cn33liz/p0wnedShell
PowerShell Runspace Post Exploitation Toolkit
Kevin-Robertson/InveighZero
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
nccgroup/ABPTTS
TCP tunneling over HTTP/HTTPS for web application servers
Arvanaghi/SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
danielbohannon/Invoke-Obfuscation
PowerShell Obfuscator
requests/requests-kerberos
An authentication handler for using Kerberos with Python Requests.
lgandx/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
sshuttle/sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
bitsadmin/wesng
Windows Exploit Suggester - Next Generation
cobbr/SharpSploit
SharpSploit is a .NET post-exploitation library written in C#
dev-2null/ADCollector
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
dev-2null/ADIDNSRecords
Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
chryzsh/DarthSidious
Building an Active Directory domain and hacking it
infosecn1nja/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
S3cur3Th1sSh1t/WinPwn
Automation for internal Windows Penetrationtest / AD-Security
enaqx/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
misterch0c/what_is_this_c2
For all these times you're asking yourself "what is this panel again?"