vinegrep's Stars
Cyber-Dioxide/CyberPhish
A heavily armed customizable phishing tool for educational purpose only
MzHmO/LeakedWallpaper
Leak of any user's NetNTLM hash. Fixed in KB5040434
deepinstinct/ShimMe
klezVirus/DriverJack
Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths
MzHmO/TGSThief
My implementation of the GIUDA project in C++
antonioCoco/RemotePotato0
Windows Privilege Escalation from User to Domain Admin.
brmkit/ad-training-lab
Automated Active Directory lab running on Proxmox
its-a-feature/offensive_macos
Tracking of offensive macOS tooling, blogs, and related helpful information
blacklanternsecurity/TREVORproxy
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
CICADA8-Research/RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
cybersectroll/SharpPersistSD
HexaCluster/pgdsat
PostgreSQL Database Security Assessment Tool
cybersectroll/TrollAMSI
cybersectroll/TrollUAC
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
TalEliyahu/awesome-CISO-maturity-models
Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appraising current processes outcomes.
HuskyHacks/SharpTokenFinder
C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps
IvanGlinkin/CCTV
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in real-time for logistics or safety, redefining how we navigate our surroundings
Meowmycks/LetMeowIn
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
KDot227/SomalifuscatorV2
Most advanced and poorly coded windows batch obfuscator ever made (aka the best)
WINSDK/bite
Disassembler focused on comprehensive rust support.
RePRGM/Nimperiments
Various one-off pentesting projects written in Nim. Updates happen on a whim.
Helixo32/CrimsonEDR
Simulate the behavior of AV/EDR for malware development training.
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
bcoles/kasld
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
foxlox/GIUDA
Ask a TGS on behalf of another user without password
Notselwyn/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
RedefiningReality/Cobalt-Strike
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection
subat0mik/Misconfiguration-Manager
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
Fortiphyd/GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)