maxDcb's Stars
massgravel/Microsoft-Activation-Scripts
Open-source Windows and Office activator featuring HWID, Ohook, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
gophish/gophish
Open-Source Phishing Toolkit
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
winsiderss/systeminformer
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals.com
jopohl/urh
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
microsoft/STL
MSVC's implementation of the C++ Standard Library.
rofl0r/proxychains-ng
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
angr/angr
A powerful and user-friendly binary analysis platform!
everdox/InfinityHook
Hook system calls, context switches, page faults and more.
flozz/p0wny-shell
Single-file PHP shell
dirkjanm/ROADtools
A collection of Azure AD/Entra tools for offensive and defensive security purposes
p0dalirius/Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
OWASP/QRLJacking
QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.
dafthack/GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
angr/angr-management
The official angr GUI.
med0x2e/GadgetToJScript
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
AykutSarac/github-rater
📊 Check your GitHub rating, view results and enhance your profile quality.
reveng007/DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
Mayyhem/SharpSCCM
A C# utility for interacting with SCCM
0xlane/BypassUAC
Use ICMLuaUtil to Bypass UAC!
bohops/UltimateWDACBypassList
A centralized resource for previously documented WDAC bypass techniques
factionsecurity/faction
Pen Test Report Generation and Assessment Collaboration
antonioCoco/SspiUacBypass
Bypassing UAC with SSPI Datagram Contexts
thomasxm/BOAZ_beta
Multilayered AV/EDR Evasion Framework
hashview/hashview
A web front-end for password cracking and analytics
kyxiaxiang/Beacon_Source
not a reverse-engineered version of the Cobalt Strike Beacon
jsecurity101/ETWInspector
vxCrypt0r/AMSI_VEH
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
maxDcb/C2TeamServer
TeamServer and Client of Exploration Command and Control Framework
maxDcb/OpenShiftGrapher
OpenShift Pentesting Tool for enumerating and graphing clusters in Neo4j