netero1010's Stars
massgravel/Microsoft-Activation-Scripts
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
docker-easyconnect/docker-easyconnect
使深信服(Sangfor)开发的非自由的 VPN 软件 EasyConnect 和 aTrust 运行在 docker 或 podman 中,并作为网关和/或提供 socks5、http 代理服务
DataTalksClub/llm-zoomcamp
LLM Zoomcamp - a free online course about real-life applications of LLMs. In 10 weeks you will learn how to build an AI system that answers questions about your knowledge base.
kgretzky/pwndrop
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
dirkjanm/ROADtools
A collection of Azure AD/Entra tools for offensive and defensive security purposes
GhostPack/Certify
Active Directory certificate abuse.
pushsecurity/saas-attacks
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
c3c/ADExplorerSnapshot.py
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
Macmod/godap
A complete terminal user interface (TUI) for LDAP.
REDMED-X/OperatorsKit
Collection of Beacon Object Files (BOF) for Cobalt Strike
BlackSnufkin/LitterBox
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Dec0ne/DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
BC-SECURITY/Moriarty
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
senzee1984/EDRPrison
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
zyn3rgy/smbtakeover
BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions
logangoins/Cable
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
Tylous/FaceDancer
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
JumpsecLabs/TokenSmith
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of the box with many popular Azure post exploitation tools.
ricardojoserf/NativeBypassCredGuard
Bypass Credential Guard by patching WDigest.dll using only NTAPI functions
AmberWolfCyber/NachoVPN
A delicious, but malicious SSL-VPN server 🌮
ajm4n/DLLHound
Find potential DLL Sideloads on your windows computer
nettitude/TokenCert
TokenCert
lsecqt/SharpRedirect
Simple C# Redirector
0xthirteen/reg_snake
Python tool to interact with WMI StdRegProv
nickvourd/Rocabella
Sniffing files generator
ibaiC/MFade
A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure points in Mircrosoft Services.
ditmer/Drop-Pi
This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social engineering penetration test.
nettitude/raccoon
Hackcraft-Labs/ScheduleRunner
A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
vysecurity/IPFilter
IP address filter by City