hardwaterhacker's Stars
lc/gau
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
mgeeky/Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
codingo/Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Mr-Un1k0d3r/EDRs
threatexpress/domainhunter
Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
0x00-0x00/ShellPop
Pop shells like a master.
aahmad097/AlternativeShellcodeExec
Alternative Shellcode Execution Via Callbacks
eladshamir/Internal-Monologue
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
matterpreter/OffensiveCSharp
Collection of Offensive C# Tooling
gwen001/github-search
A collection of tools to perform searches on GitHub.
tenable/poc
Proof of Concepts
vysecurity/LinkedInt
LinkedIn Recon Tool
mvelazc0/defcon27_csharp_workshop
Writing custom backdoor payloads with C# - Defcon 27 Workshop
RedSiege/WMImplant
This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/remote machine. WMImplant is WMI based.
bats3c/darkarmour
Windows AV Evasion
skahwah/SQLRecon
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
proxycannon/proxycannon-ng
A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
Raikia/UhOh365
A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.
fortra/No-Consolation
A BOF that runs unmanaged PEs inline
Dec0ne/DllNotificationInjection
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
brandonprry/gray_hat_csharp_code
This repository contains full code examples from the book Gray Hat C#
fin3ss3g0d/cypherhound
Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers
ustayready/SharpHose
Asynchronous Password Spraying Tool in C# for Windows Environments
rvrsh3ll/CPLResourceRunner
Run shellcode from resource
r4wd3r/RID-Hijacking
Windows RID Hijacking persistence technique
tevora-threat/PowerView3-Aggressor
Cobalt Strike Aggressor script menu for Powerview/SharpView
rhodejo/OSCP-Prep
skelsec/CVE-2017-12542
Test and exploit for CVE-2017-12542
werdhaihai/SharpAltShellCodeExec
Alternative Shellcode Execution Via Callbacks in C# with P/Invoke
thalpius/Microsoft-Defender-for-Identity-Check-Instance
This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defender for Identity instance. This way you can figure out if a company runs Microsoft Defender for Identity.