siunam321's Stars
someshkar/colabcat
:smiley_cat: Running Hashcat on Google Colab with session backup and restore.
blackarrowsec/redteam-research
Collection of PoC and offensive techniques used by the BlackArrow Red Team
decoder-it/LocalPotato
dirkjanm/BloodHound.py
A Python based ingestor for BloodHound
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
lefayjey/linWinPwn
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
0xmaximus/Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
internetwache/GitTools
A repository with 3 tools for pwn'ing websites with .git repositories available
hkcert-ctf/CTF-Challenges
Capture the flag challenges
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
rasta-mouse/Sherlock
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
lgandx/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
sagishahar/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
andrew-d/static-binaries
Various *nix tools built as statically-linked binaries
ohpe/juicy-potato
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
JohnHammond/msdt-follina
Codebase to generate an msdt-follina payload
hfiref0x/UACME
Defeating Windows User Account Control
byt3bl33d3r/CrackMapExec
A swiss army knife for pentesting networks
sshuttle/sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
jpillora/chisel
A fast TCP/UDP tunnel over HTTP
JohnHammond/active_directory
Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010
zrax/pycdc
C++ python bytecode disassembler and decompiler
spipm/Depix
Recovers passwords from pixelized screenshots
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
BC-SECURITY/Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
BC-SECURITY/Starkiller
Starkiller is a Frontend for PowerShell Empire.
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
The-Z-Labs/linux-exploit-suggester
Linux privilege escalation auditing tool
rebootuser/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.