lengers's Stars
Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Cobalt-Strike/sleep_python_bridge
This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. NOTE: This project is very much in BETA. The goal is to provide a playground for testing and is in no way an officially support feature. Perhaps this could be something added in the future to the core product.
CCob/BOF.NET
A .NET Runtime for Cobalt Strike's Beacon Object Files
d0nkeys/redteam
Red Team Scripts by d0nkeys (ex SnadoTeam)
0xShaolin/CMD_Bypass
Is command prompt blocked on your school/work computers? Here is an easy fix!
kevindesai777/suggest-a-restaurant
A simple Android app written in Kotlin to randomly pick a restaurant around you.
deepzec/Bad-Pdf
Steal Net-NTLM Hash using Bad-PDF
RhinoSecurityLabs/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
samyk/poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
drwetter/F5-BIGIP-Decoder
Detecting and decoding BIGIP cookies in bash
ElWanderer/kOS_scripts
kOS scripts and libraries
iGio90/Dwarf
Full featured multi arch/os debugger built on top of PyQt5 and frida
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
unprovable/PentestHardware
Kinda useful notes collated together publicly
skylot/jadx
Dex to Java decompiler
GTFOBins/GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
honze-net/nmap-bootstrap-xsl
A Nmap XSL implementation with Bootstrap.
njbrown09/Telemachus-Continued
hugomd/parrot.live
🐦 Bringing animated parrots to terminals everywhere
rshipp/awesome-malware-analysis
Defund the Police.
LordNoteworthy/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
trahloff/Pratchett-as-a-Service
n1nj4sec/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
dropbox/zxcvbn
Low-Budget Password Strength Estimation