Note Book
  • 😎Weee
  • UBUNTU: Installing LAMP Stack
  • Starting with Burp Suite
  • confort zone
  • Linux
    • Linux Structure
    • Introduction to Shell
    • Prompt Description
    • Getting Help
    • System Information
    • Cheat sheet
    • REf
    • NFS Configs
  • Random
  • OSINT
  • Affiliate links
  • Ref
    • Infosec career resources
    • Network Security
    • Cloud Dev OPs
  • network
    • Networking Custom Packet
  • CheckLists
  • 🧑‍🏫Pentest-Tools
  • 📚resources
Powered by GitBook
On this page
  • Pentest-Tools
  • Windows Active Directory Pentest
  • AMSI Bypass restriction Bypass
  • Payload Hosting
  • Network Share Scanner
  • Reverse Shellz
  • Backdoor finder
  • Lateral Movement
  • POST Exploitation
  • Post Exploitation - Phish Credentials
  • Wrapper for various tools
  • Pivot
  • Active Directory Audit and exploit tools
  • Persistence on windows
  • Web Application Pentest
  • Framework Discovery
  • Framework Scanner / Exploitation
  • Web Vulnerability Scanner / Burp Plugins
  • Network- / Service-level Vulnerability Scanner
  • File / Directory / Parameter discovery
  • Crawler
  • Web Exploitation Tools
  • REST API Audit
  • SAML Login
  • Swagger File API Attack
  • Windows Privilege Escalation / Audit
  • Windows Privilege Abuse (Privilege Escalation)
  • T3 Enumeration
  • Linux Privilege Escalation / Audit
  • Exfiltration
  • Credential harvesting Windows Specific
  • LSASS dumper / process dumper
  • Credential harvesting Linux Specific
  • Data Exfiltration - DNS/ICMP/Wifi Exfiltration
  • Git Specific
  • Windows / Linux
  • Reverse Engineering / decompiler
  • Forensics
  • Network Attacks
  • Specific MITM service Exploitation
  • Sniffing / Evaluation / Filtering
  • Red-Team SIEM
  • Scanner / Exploitation-Frameworks / Automation
  • Default Credential Scanner
  • Default Credential Lookup
  • Payload Generation / AV-Evasion / Malware Creation
  • Shellcode Injection
  • Loader / Packer / Injectors
  • EDR Evasion - Logging Evasion
  • Useful Binary Modification tools
  • Android
  • External Penetration Testing
  • Domain Finding / Subdomain Enumeration
  • File Search / Metadata extraction
  • Scanner
  • Email Gathering
  • Check Email Accounts
  • Domain Auth + Exploitation
  • Exchange RCE-exploits
  • MobileIron RCE
  • Specific Service Scanning / Exploitation
  • Login Brute Force + Wordlist attacks
  • SNMP
  • Open X11
  • Printers
  • MSSQL
  • Oracle
  • IKE
  • SMB Null Session Exploitation
  • iLO Exploitation
  • vmware vCenter Exploits
  • Intel AMT Exploitation
  • SAP Exploitation
  • FPM port
  • Weblogic Exploitation
  • Sharepoint exploitation
  • JIRA
  • Sonicwall VPN
  • VSphere VCenter
  • Dameware
  • Confluence Exploit
  • Telerik UI for ASP.NET AJAX Exploit
  • General Recon
  • Solarwinds
  • Command & Control Frameworks
  • Mythic Agents
  • VBA
  • Rust
  • Go
  • Cobalt Strike Stuff
  • Android
  • Linux MacOSX Specific
  • Wifi Tools
  • Android / Nethunter
  • NAT Slipstreaming
  • Raspberri PI Exploitation
  • Physical Security / HID/ETH Emulator
  • Social Engeneering
  • Defender Guides / Tools / Incident Response / Blue Team
  • Wordlists / Wordlist generators
  • AD Lab Environment
  • Obfuscation
  • Hash Crack / Decryption
  • Source Code / Binary Analysis
  • Binary Analysis
  • Source Code Analysis
  • Nim
  • MISC
  • Big-IP Exploitation
  • Azure Cloud Tools
  • Anonymous / Tor Projects
  • Exploit Search
  • Industrial Control Systems
  • Network access control bypass
  • Jenkins
  • JMX Exploitation
  • Citrix Netscaler Pwn
  • mikrotik pwn
  • Red Team infrastructure setup
  • Bypass SPF/DKIM/DMARC
  • Redis Exploitation
  • Apache Tomcat Exploitation
  • SSRF Exploitation
  • LFI exploitation
  • MondoDB Redis Couchdb Exploitation
  • XXE
  • Elasticsearch / Kibana Exploitation
  • RMI attacks
  • JSON Web Token Analysis / Exploitation
  • Docker Exploitation
  • PHP exploits
  • Cloud attack tools
  • Bluetooth / low energy
  • Wireless / Radio Exploitation
  • APT / Malware Emulation / Defense Check
  • Hash Crack / Lookup
  • OSCP Lists / tools / help
  • ASPX Webshells
  • PHP Webshells
  • JSP WebShells
  • Other Tool-Lists / Cheat Sheets

Was this helpful?

Pentest-Tools

PreviousCheckListsNextresources

Last updated 3 years ago

Was this helpful?

Pentest-Tools

And many more. I created this repo to have an overview over my starred repos. I was not able to filter in categories before. Feel free to use it for yourself. I do not list Kali default tools as well as several testing tools which are state of the art. STRG+F searches are helpful here.

Windows Active Directory Pentest

General usefull Powershell Scripts

AMSI Bypass restriction Bypass

Payload Hosting

Network Share Scanner

Find Juicy Stuff

Reverse Shellz

Backdoor finder

Lateral Movement

POST Exploitation

Post Exploitation - Phish Credentials

Wrapper for various tools

Pivot

Active Directory Audit and exploit tools

Persistence on windows

Web Application Pentest

Framework Discovery

Framework Scanner / Exploitation

Web Vulnerability Scanner / Burp Plugins

Network- / Service-level Vulnerability Scanner

File / Directory / Parameter discovery

Crawler

Web Exploitation Tools

REST API Audit

SAML Login

Swagger File API Attack

Windows Privilege Escalation / Audit

Windows Privilege Abuse (Privilege Escalation)

T3 Enumeration

Linux Privilege Escalation / Audit

Exfiltration

Credential harvesting Windows Specific

LSASS dumper / process dumper

Credential harvesting Linux Specific

Data Exfiltration - DNS/ICMP/Wifi Exfiltration

Git Specific

Windows / Linux

Reverse Engineering / decompiler

Forensics

Network Attacks

Specific MITM service Exploitation

Sniffing / Evaluation / Filtering

Red-Team SIEM

Scanner / Exploitation-Frameworks / Automation

Default Credential Scanner

Default Credential Lookup

Payload Generation / AV-Evasion / Malware Creation

Shellcode Injection

Loader / Packer / Injectors

EDR Evasion - Logging Evasion

Useful Binary Modification tools

Android

External Penetration Testing

Domain Finding / Subdomain Enumeration

File Search / Metadata extraction

Scanner

Email Gathering

Check Email Accounts

Domain Auth + Exploitation

Exchange RCE-exploits

MobileIron RCE

Specific Service Scanning / Exploitation

Login Brute Force + Wordlist attacks

SNMP

Open X11

Printers

MSSQL

Oracle

IKE

SMB Null Session Exploitation

iLO Exploitation

vmware vCenter Exploits

Intel AMT Exploitation

SAP Exploitation

FPM port

Found Port 9001 open? Try that:

Weblogic Exploitation

Sharepoint exploitation

JIRA

Sonicwall VPN

VSphere VCenter

Dameware

Confluence Exploit

Telerik UI for ASP.NET AJAX Exploit

General Recon

Solarwinds

Command & Control Frameworks

Mythic Agents

VBA

Rust

Go

Cobalt Strike Stuff

Android

Linux MacOSX Specific

Wifi Tools

Android / Nethunter

NAT Slipstreaming

Raspberri PI Exploitation

Physical Security / HID/ETH Emulator

Social Engeneering

Defender Guides / Tools / Incident Response / Blue Team

Wordlists / Wordlist generators

AD Lab Environment

Obfuscation

Hash Crack / Decryption

Source Code / Binary Analysis

Binary Analysis

Source Code Analysis

Nim

MISC

Big-IP Exploitation

Azure Cloud Tools

Anonymous / Tor Projects

Exploit Search

Industrial Control Systems

Network access control bypass

Jenkins

JMX Exploitation

Citrix Netscaler Pwn

mikrotik pwn

Red Team infrastructure setup

Bypass SPF/DKIM/DMARC

Redis Exploitation

MSF:

  • scanner/redis/file_upload

  • exploit/linux/redis/redis_replication_cmd_exec

Windows Targets - Webshell upload

redis-cli -h targethost -p targetport
config set dir C:\inetpub\wwwroot\
config set dbfilename shell.aspx
set test "Webshell content"
save

Apache Tomcat Exploitation

SSRF Exploitation

LFI exploitation

MondoDB Redis Couchdb Exploitation

XXE

Elasticsearch / Kibana Exploitation

RMI attacks

JSON Web Token Analysis / Exploitation

Docker Exploitation

PHP exploits

Cloud attack tools

Bluetooth / low energy

Wireless / Radio Exploitation

APT / Malware Emulation / Defense Check

Hash Crack / Lookup

OSCP Lists / tools / help

ASPX Webshells

PHP Webshells

JSP WebShells

Other Tool-Lists / Cheat Sheets

- 😎

- same but kerberos auth for more stealth and lockout-sleep

- domainpasswordspray executable with lockout-sleep

- supported version - really nice Excel-Sheet for an AD-Overview

- Various Powersploit Tasks in C#

- Adidns Attacks

- modified PowerLessShell

C# Powershell

- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP and AV bypass, AMSI patched

- Constrained language mode bypass

- Applocker Bypass

- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes through the use of runspace.

- The Hunt for Malicious Strings

- Bypass AMSI and Defender using Ordinal Values in VBS

- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, CLM and Script Block Logging disabled at startup

- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().

- MSBuild without MSbuild.exe

- MSBuildShell, a Powershell Host running within MSBuild.exe

- Executes Blended Managed/Unmanged Exports

- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies / Applocker Bypass Scan

- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.

- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.

- Bypass LSA Protection - Dump the memory of a PPL with a userland exploit

- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

- Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.

- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4

- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.

- Search tool to find specific files containing specific words, i.e. files containing passwords..

- .NET 4.0 Console App to browse VMDK / VHD images and extract files

- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain

- A small reverse shell for Linux & Windows

- netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)

- C# reverse shell using Background Intelligent Transfer Service (BITS) as communication protocol and direct syscalls for EDR user-mode hooking evasion.

- WMI,SMB,RDP,SCM,DCOM Lateral Movement techniques

- WMI, SCM, DCOM, Task Scheduler and more

- C# Port of Invoke-DCOM

- An implementation of PSExec in C#

- CsExec, CsPosh (Remote Powershell Runspace), CsWMI,CsDCOM

- Automate Getting Dom-Adm

- automated lateral movement

- backdoor / rootkit

- automation for various mitm attacks + vulns

- automated penetration toolkit

- Netbios Network interface Enumeration (discovery of dual homed hosts)

- Find dual homed hosts over DCOM

- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object

- unconstrained delegation, printer bug (MS-RPRN) exploitation, Remote ADIDNS attacks

- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

- AD Bloodhound 3.0 Path

- A Bypass Anti-virus Software Lateral Movement Command Execution Tool

- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface.

- Collection of remote authentication triggers in C#

- Implementation of SpoolSample without rDLL

- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.

- C# application that allows you to quick run SSH commands against a host or list of hosts

- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.

- .NET 4.0 Scheduled Job Lateral Movement

- Remotely enables Restricted Admin Mode

- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript

- Python tool to Check running WebClient services on multiple targets based on @leechristensen -

- Tools for Kerberos PKINIT and relaying to AD CS

- Get file less command execution for lateral movement.

- Automatically scan any windows or tabs for login forms and then record what gets posted. A notification will appear when some have arrived.

- McAfee Epo or Solarwinds post exploitation

- A POC Remote Desktop (RDP) session hijack utility for disconnected sessions

- RunasCs - Csharp and open version of windows builtin runas.exe

- Powershell VNC injector

- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.

- .NET 4.0 Project to interact with video, audio and keyboard hardware.

- Lockless allows for the copying of locked files.

- C# Clipboard Monitor

- SharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching termsrv.dll file.

- MultiRDP is a C# consosle application to make multiple RDP (Remote Desktop) sessions possible by patching termsrv.dll correctly.

- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.

- A little tool to play with Outlook

- Tool for interacting with outlook interop during red team engagements

- 2 ways of Password Filter DLL to record the plaintext password

- A .NET tool for exporting and importing certificates without touching disk.

- Retrieve LAPS password from LDAP

- remote LAPS dumping from linux

- Windows active user credential phishing tool

- Creates a login prompt to gather username and password of the current user. This project allows red team to phish username and password of the current user without touching lsass and having adminitrator credentials on the system.

- Phish Smartcard PIN

- PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.

- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.

- Various .NET Tools wrapped in Powershell

- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects

- rundll32 Wrapper for Rubeus

- execute Python in C# via ironpython

- Webshell tunnel over socks proxy - pentesters dream

- reGeorg customized for weblogic

TCP tunneling over HTTP/HTTPS for web application servers like reGeorg

- check for internet access over open ports / egress filtering

- C# Wrapper around Chisel from

- A fast TCP tunnel over HTTP

- ping tunnel is a tool that advertises tcp/udp/socks5 traffic as icmp traffic for forwarding.

- Reverse Tunneling made easy for pentesters, by pentesters

- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop

- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse

- Amplify network visibility from multiple POV of other hosts

- A tool to make socks connections through HTTP agents

- TCP Port Redirection Utility

- socks4 reverse proxy for penetration testing

- C# Data Collector for the BloodHound Project, Version 3

- Maximizing BloodHound. Max is a good boy.

- same as invoke-aclpwn but in python

- Active Directory information dumper via LDAP

- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket

- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket

- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments

- Add SD for controlled computer object to a target object for RBCD using LDAP

- Active Directory certificate abuse.

- Python implementation for Active Directory certificate abuse

- ADCS abuser

- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.

- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)

- C# version of Powermad

- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification

- Python version of the C# tool for "Shadow Credentials" attacks

- pyForgeCert is a Python equivalent of the ForgeCert.

- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.

- "Golden" certificates

- Hijack Printconfig.dll to execute shellcode

- Wordpress, Joomla, Drupal Scanner

- wordpress

- lotus domino

- Drupal

- Typo3

- Joomla

- all in one scanner

- XSS discovery

- Burpsuite Extension to bypass 403 restricted directory

- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.

- Mining parameters from dark corners of Web Archives

- 💗

- Directory lookup from Javascript files

- Automation for javascript recon in bug bounty.

- Admin Panel Finder

- Headless web crawler for bugbounty and penetration-testing/redteaming

- 💗

- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

- lfi

- xxe

- shellz

- ssti

- xpath injection

- File Uploads

- deserialization

- IIS Short Filename Vuln. exploitation

- Deserialize Java Exploitation

- Deserialize .NET Exploitation

- Exploit .git Folder Existence

- Leak git repositories from misconfigured websites

- SSRF Tutorials

- PHP Unserialize Payload generator

- Malicious Office XXE payload generator

- Angularjs Csti Scanner

- Deserialize .NET Viewstates

- Deserialize .NET Viewstates

- RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.

- Python Script for SAML2 Authentication Passwordspray

- Privilege Escalation Enumeration Script for Windows

- powerfull Privilege Escalation Check Script with nice output

- UAC

- C# tool for UAC bypasses

- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components

- UAC

- find vulnerable dlls for preloading attack

- dll hijack scanner

- admin to system

- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)

- Abuse Windows Privileges

- load malicious dlls from system32

- Exploit potatoes with automation

- from Service Account to System

- Another Windows Local Privilege Escalation from Service Account to System

- Abusing Impersonation Privileges on Windows 10 and Server 2019

- itm4ns Printspoofer in C#

- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).

- Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.

- Recover the default privilege set of a LOCAL/NETWORK SERVICE account

- powerfull Privilege Escalation Check Script with nice output

- lookup vulnerable installed software

- find suid bins and look them up under gtfobins / exploitable or not

- Offline GTFOBins

- sudo misconfiguration exploitation

- easily manipulate the tty and create fake binaries

- not really privesc but helpfull

- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket

- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into memory.

- Kerberoast with ACL abuse capabilities

- remote lazagne

- Browser Creds gathering

- hack-browser-data is an open-source tool that could help you decrypt data[passwords|bookmarks|cookies|history] from the browser.

- ClipHistory feature get the last 25 copy paste actions

- extract live rdp logins

- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.

- .NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.

- Chromium Cookie import / export tool

- ThunderFox for Firefox Credentials, SitkyNotesExtract for "Notes as passwords"

- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon

- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py

- C# tool to discover low hanging fruits like SessionGopher

- DPAPI Creds via C#

- C# porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands

- Dumping DPAPI credz remotely

- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege

- Mimikatz implementation in pure Python

- PIC lsass dumper using cloned handles

- Dump stuff without touching disk

- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory

- Command line interface to dump LSASS memory to disk via SilentProcessExit

- dump lsass using direct system calls and API unhooking

- C# Lsass parser

- Create a minidump of the LSASS process from memory - using Dumpert

- Evade WinDefender ATP credential-theft

- remote procdump.exe, copy dump file to local system and pypykatz for analysis/extraction

- This project reuses open handles to lsass to parse or minidump lsass

- SSH Credential loot

- SSH / Sudo / SU Credential loot

- Tool to extract Kerberos tickets from Linux kernel keys.

- Wifi Exfiltration

- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP

- Easy files and payloads delivery over DNS

- Hide your payload in DNS

- Modular C# framework to exfiltrate loot over secure and trusted channels.

- .NET Disassembler

- 💗

- more up to date

- Deprecated but still good

- mitm6 in C# + Inveigh default features

- Farmer is a project for collecting NetNTLM hashes in a Windows domain. Farmer achieves this by creating a local WebDAV server that causes the WebDAV Mini Redirector to authenticate from any connecting clients.

- leaking net-ntlm with webdav

- Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality

- SSH

- WSUS

- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations

- WSUS mitm - Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.

- RDP

- RDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact

- Fake Updates for various Software

- web application live recording, keystroke logger

- User Enumeration with SMB Relay Attacks

-

- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.

- automate nmap with scripting capabilities

- Spray a hash via smb to check for local administrator access

- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.

- screenshot for webservers

- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password

- Office RCE POC

- Bring your own print driver privilege escalation tool

- reverse shell generator

- Sandbox Evasion techniques

- SandBox Evasion in C#

- Encrypted HTA Generation

- Optimized GadgetToJScript version

- Shikata ga nai (仕方がない) encoder ported into go with several improvements

- Spotter is a tool to wrap payloads in environmentally-keyed, AES256-encrypted launchers.

- Malleable payload generation framework.

- Build Powershell Script from .NET Executable

- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.

- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)

- AES Encrypt payloads

- Embed and hide any file in an HTML file

- AES Encrypt C/C++ Compiled binaries and decrypt at runtime

- PoC of a VBA macro spawning a process with a spoofed parent and command line.

- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.

- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.

- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.

- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.

- Excel Macro Document Reader/Writer for Red Teamers & Analysts

- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets

- PwnyForm will take an MSI installer as input and generate an MSI transform (mst) that can be used to inject arbitrary command execution by adding a custom action that will execute during the UI or Install sequence of an MSI file.

- VBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents. Documents that only contain source code and no compiled code are more likely to evade AV detection and YARA rules.

- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just double click them.

- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.

- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.

- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading

- Koppeling x Metatwin x LazySign

- Sign an executable for AV-Evasion

- A tool for generating fake code signing certificates or signing real ones

- RCE 0-day for GhostScript 9.50 - Payload generator - ImageMagick

- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)

- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.

- Template-Driven AV/EDR Evasion Framework

- BadAssMacros - C# based automated Malicous Macro Generator.

- LittleCorporal: A C# Automated Maldoc Generator

- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file

- ScareCrow - Payload creation framework designed around EDR bypass.

- Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable

- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

- D/Invoke port of UrbanBishop

- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution

- Donut for Shellcode Injection

- Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx, WriteProcessMemory and CreateRemoteThread.

- Shellcode injection POC using syscalls.

- Shellcode wrapper with encryption for multiple target languages

- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.

- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread

- A set of scripts that demonstrate how to perform memory injection in C#

- SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls.

- X86 version of syswhispers2 / x86 direct system call

- CreateThreadpoolWait, Fiber Load, NtTestAlert Load, SEH Except Load, TLS CallBack Load, Dynamic Load, Dynamic Load plus, Syscall Load, APC-Inject Load, Early Brid APC-Inject Load, NtCreateSection-Inject Load, OEP Hiijack-Inject Load, Thread Hiijack-Inject Load

- Suite of Shellcode Running Utilities

- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process

- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions

- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)

- This program is designed to demonstrate various process injection techniques

- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this project up as I learn, discover or develop more techniques. Some techniques are better than others at bypassing AV.

- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL

- Another meterpreter injection technique using C# that attempts to bypass Defender

- Module Stomping, No New Thread, HellsGate syscaller, UUID Dropper for x64 Windows 10!

- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used

- Complete Arsenal of Memory injection and other techniques for red-teaming in Windows

- Injects shellcode into remote processes using direct syscalls

- A collection of weird ways to execute unmanaged code in .NET

- Evasive shellcode loader for bypassing event-based injection detection (PoC)

- A protective and Low Level Shellcode Loader that defeats modern EDR systems.

- C++ Injection techniques

-

- POCs for Shellcode Injection via Callbacks

- PoC for UUID shellcode execution using DInvoke

- Alternative Shellcode Execution Via Callbacks

- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)

- CallBack-Techniques for Shellcode execution ported to Nim

- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash)

- Reflective PE packer.

- Suite of Shellcode Running Utilities

- Open-Source PE Packer

- This project describes a technique how a NATIVE dynamic link library (DLL) can be loaded from memory (In C#) without storing it on the hard-disk first.

- C# Reflective loader for unmanaged binaries.

- A method of bypassing EDR's active projection DLL's by preventing entry point execution

- Evade sysmon and windows event logging

- C# Implementation of the Hell's Gate VX Technique

- Original C Implementation of the Hell's Gate VX Technique

- C++ Version of Invoke-Phantom

- C# version of Invoke-Phantom

- .Net Assembly to block ETW telemetry in current process

- A Bind Shell Using the Fax Service and a DLL Hijack

- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDump() Shellcode

- This is a tool that allows you to offensively use YARA to apply a filter to the events being reported by windows event logging.

- Extracting Syscall Stub, Modernized

- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation

- LoadLibrary for offensive operations

- Same but with LLVM support

- An implementation of a Windows loader that can load dynamic-linked libraries (DLLs) directly from memory

- A tool to kill antimalware protected processes

- Tool to bypass LSA Protection (aka Protected Process Light)

- get NTDLL copy from suspended process

- A way to delete a locked file, or current running executable, on disk.

- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs

- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

- A centralized resource for previously documented WDAC bypass techniques

- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

- A shellcode function to encrypt a running process image when sleeping.

- some gadgets about windows process and ready to use :)

- A memory scanning evasion technique

- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.

- A more stealthy variant of "DLL hollowing"

- Phantom DLL hollowing PoC

- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging

- C# Based Universal API Unhooker

- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware

- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)

- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls

- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.

- A manual system call library that supports functions from both ntdll.dll and win32u.dll

- Resolve syscall numbers at runtime for all Windows versions.

- Enumerating and removing kernel callbacks using signed vulnerable drivers

- Enumerate and disable common sources of telemetry used by AV/EDR.

- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.

- I used this to see if an EDR is running in Safe Mode

- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userland Hooking.

+ Scanner

- more like an audit

- 💗

- The Swiss Army knife for automated Web Application Testing

- Find Emails of Github Users

- super fast emails via google/bing linkedin dorks

- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.

- allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.

- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.

- Tool to enumerate information from NTLM authentication enabled web endpoints

- rotate IP Adresses over AWS - Combine with MSOLSpray

- office 365 recon

- lockout Time integrated

- Lync Credential Finder

- Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient

- Lync Credential Finder

- Use to browse the share file by eas(Exchange Server ActiveSync)

- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.

- Modified version of PEAS client for offensive operations -

- A C# tool to send emails through Outlook from the command line or in memory

- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb

- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.

- onedrive user enumeration - pentest tool to enumerate valid onedrive users

- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source:

- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln

- Password attacks and MFA validation against various endpoints in Azure and Office 365

- User enumeration with Microsoft Teams API

- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling

- Exchange2010 authorized RCE

- OWA Deserialisation RCE

- Brute force non hydra compliant services - RDP, VNC, OpenVPN

- Brute Force various services

- 😎

- Crack any Microsoft Windows users password without any privilege (Guest account included)

- RDP Password Spray - No Event Logs

- Python3 tool to perform password spraying using RDP

- Automation for PRET

- Exploit for CVE-2020-3952 in vCenter 6.7

- bash poc scripts to exploit open fpm ports

- scan/test for nearly all weblogic vulns

- WEblogic Server Tests

- cve-2019-2725

- Sharepoint Fingerprint + Exploitation

- One stop place for exploiting Jira instances in your proximity

- .NET Project for Attacking vCenter

- Confluence Server Webwork OGNL injection

- SolarWinds Orion Account Audit / Password Dumping Utility

- Command and Control Framework written in C#.

- Empire with embedded AMSI-Bypass

- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.

- Source for tasks I have used with Covenant

- Implant framework

- A post exploitation framework designed to operate covertly on heavily monitored environments

- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.

- Open-Source Remote Administration Tool For Windows C# (RAT)

- Small and convenient C2 tool for Windows targets

- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

- This repository is a collection of my malicious VBA projects.

- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.

- AMSI Bypass Via the Heap

- This repo covers some code execution and AV Evasion methods for Macros in Office documents

- Dynamically invoke arbitrary unmanaged code.

- Rust Weaponization for Red Team Engagements.

- Golang PE injection on windows

- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel

- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File

- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads

- Various Cobalt Strike BOFs

- A BOF port of the research of @thefLinkk and @codewhitesec

- Situational Awareness commands implemented using Beacon Object Files

- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module

- BOF implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs

- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.

- Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.

- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon

- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.

- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.

- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly

- Read the contents of DOCX files using Cobalt Strike's Execute-Assembly

- Project to enumerate proxy configurations and generate shellcode from CobaltStrike

- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

- Remove API hooks from a Beacon process.

- Collection of Beacon Object Files

- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)

- Powerful framework for rogue access point attack.

- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website

- PCI-based DMA

- PCI based DMA

- Teensy Payloads

- lookup valid phishing-Domains

- lookup valid phishing-Domains

- Change SMB Files on the fly

- Comprehensive Web Based Phishing Suite of Tools for Rapid Deployment and Real-Time Alerting!

- Hunts out CobaltStrike beacons and logs operator command output

- Detect and respond to Cobalt Strike beacons using ETW.

- Detect AMSI.dll in memory patch

- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.

- Credential and Red Teaming Defense for Windows Environments

- powershell obfuscation detection

- Lists of .NET Deobfuscator and Unpacker (Open Source)

- python exe decompile

- .NET Revoke-Obfuscation

- ids

- Investigate malicious Windows logon by visualizing and analyzing Windows event log

- AD Passwort Blacklisting

- Powershell DE-Obfuscation

- A tool for de-obfuscating PowerShell scripts

- Identifies the bytes that Microsoft Defender flags on.

- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.

- Tool written in python3 to determine where the AV signature is located in a binary/payload

- An Active Defense and EDR software to empower Blue Teams

- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

- AD Security Intrusion Detection System

- Small and highly portable detection tests based on MITRE's ATT&CK.

- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.

- Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

- PSGumshoe is a Windows PowerShell module for the collection of OS and domain artifacts for the purposes of performing live response, hunt, and forensics.

- FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch process injections as they are happening (real-time). Since FalconEye runs in kernel mode, it provides a stronger and reliable defense against process injection techniques that try to evade various user-mode hooks.

- A collection of all the data i could extract from 1 billion leaked credentials from internet.

- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab

- Automate the creation of a lab environment complete with security tooling and logging best practices

- GO Obfuscator

- Lists of .NET Obfuscator (Free, Trial, Paid and Open Source )

- Javascript Obfuscator

- Powershell Obfuscator

- .NET IL Obfuscator

- C/C++ source obfuscator for antivirus bypass

- GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.

- VBS Obfuscator

- Shellcode Obfuscator

- Shellcode Encoder

- Obfuscate Go builds

- heavily vectorized c++17 compile time string encryption.

- A more advanced free and open .NET obfuscator using dnlib.

- PowerShell Script Obfuscator

- Proof-of-concept obfuscation toolkit for C# post-exploitation tools

- YouTube/Livestream project for obfuscating C# source code using Roslyn

- Simple & Powerful PowerShell Script Obfuscator

- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.

- C obfuscator

- NIM llvm obfuscator

- Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back.

- A mostly-serverless distributed hash cracking platform

- Cracking hashes in the Cloud (for free!)

- CrackQ: A Python Hashcat cracking queue system

- Javascript

- Javascript

- PHP

- Audit tool to find common vulnerabilities in PHP source code

- Nim implementation of Process Hollowing using syscalls (PoC)

- Malicious PDF Generator

- A tiny library to automatically encrypt string literals in Nim code

- RDI implementation in Nim

- A collection of offensive Nim example code

- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique

- Nim Socks5 library

- Azure JWT Token Manipulation Toolset

- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.

- Drupal Exploit

- SAMBA Exploit

- Reverse Shell Oneliner / Payload Generation

- Reverse/Bind Shell Generator

- check if a user is valid in a domain

- Living of the Land Binaries

- Windows Denial of Service Exploit

- Windows Denial of Service Exploit

PDF Steal NTLMv2 Hash Exploit - CVE-2018-4993

- 💥 🔥 💥

- LibSSH Authentication Bypass vuln.

- windows Privesc Exploit

- OSINT

- Deserialisation Exploits

- S3 bucket tester

- Zone transfer like for internal assessment

- Get-ShellContent.ps1 get the typed content for all open shells

- windows CTF Exploitation

- Apache Privilege Escalation

- Windows Elevation(持续更新)

- Execute python from powershell

- Recovers passwords from pixelized screenshots

- This is a tool suite consisting of miscellaneous offensive tooling aimed at red teamers/penetration testers to primarily aid in Defense Evasion TA0005

- Utility to find AES keys in running processes

- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.

- A C# port of the MinHook API hooking library

- This repo contains information about EDRs that can be useful during red team exercise.

- The Azure AD exploration framework.

- Find exposed data in Azure with this public blob scanner

-

- JMX enumeration and attacking tool.

- Mogwai Java Management Extensions (JMX) Exploitation Toolkit

- Fast exploitation tool for Mikrotik RouterOS up to 6.38.4

- terraform cloud c2 redirector setup

- Red Teaming Infrastructure Automation based on Red-Baron

- This application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various cloud services. These include VMs, domain fronting, Cobalt Strike servers, API gateways, and firewalls.

- Domain Borrowing is a new method to hide C2 traffic using CDN. It was first presented at Blackhat Asia 2021 by Junyu Zhou and Tianze Ding.

- Domain Borrowing PoC

- Apache Tomcat auto WAR deployment & pwning penetration testing tool.

- AJP Exploit CVE-2020-1938

- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.

- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities

- automation of Docker TCP socket abuse

- Docker API exposed RCE

- nginx + php misconfiguration

- Full-featured C2 framework which silently persists on webserver via evil PHP oneliner

- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.

- List of Hooking DLLs for different AV vendors

- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.

🧑‍🏫
General usefull Powershell Scripts
AMSI Bypass restriction Bypass
Payload Hosting
Network Share Scanner
Lateral Movement
Reverse Shellz
POST Exploitation
Pivot
Backdoor finder
Persistence on windows
Web Application Pentest
Framework Discovery
Framework Scanner / Exploitation
Web Vulnerability Scanner / Burp Plugins
Network- / Service-level Vulnerability Scanner
Crawler
Web Exploitation Tools
Windows Privilege Escalation / Audit
T3 Enumeration
Linux Privilege Escalation / Audit
Credential harvesting Windows Specific
Credential harvesting Linux Specific
Data Exfiltration - DNS/ICMP/Wifi Exfiltration
Git Specific
Reverse Engineering / decompiler
Forensics
Network Attacks
Specific MITM service Exploitation
Sniffing / Evaluation / Filtering
Scanner / Exploitation-Frameworks / Automation
Default Credential Scanner
Payload Generation / AV-Evasion / Malware Creation
Domain Finding / Subdomain Enumeration
Scanner network level
Email Gathering
Domain Auth + Exploitation
Network service - Login Brute Force + Wordlist attacks
Command & Control Frameworks
Wifi Tools
Raspberri PI Exploitation
Social Engeneering
Wordlists / Wordlist generators
Obfuscation
Source Code Analysis
No category yet
Industrial Control Systems
NAC bypass
JMX Exploitation
https://github.com/S3cur3Th1sSh1t/WinPwn
https://github.com/dafthack/MailSniper
https://github.com/putterpanda/mimikittenz
https://github.com/dafthack/DomainPasswordSpray
https://github.com/mdavis332/DomainPasswordSpray
https://github.com/jnqpblc/SharpSpray
https://github.com/Arvanaghi/SessionGopher
https://github.com/samratashok/nishang
https://github.com/PowerShellMafia/PowerSploit
https://github.com/fdiskyou/PowerOPS
https://github.com/giMini/PowerMemory
https://github.com/Kevin-Robertson/Inveigh
https://github.com/MichaelGrafnetter/DSInternals
https://github.com/PowerShellEmpire/PowerTools
https://github.com/FuzzySecurity/PowerShell-Suite
https://github.com/hlldz/Invoke-Phant0m
https://github.com/leoloobeek/LAPSToolkit
https://github.com/sense-of-security/ADRecon
https://github.com/adrecon/ADRecon
https://github.com/Arno0x/PowerShellScripts
https://github.com/S3cur3Th1sSh1t/Grouper
https://github.com/l0ss/Grouper2
https://github.com/NetSPI/PowerShell
https://github.com/NetSPI/PowerUpSQL
https://github.com/GhostPack
https://github.com/Kevin-Robertson/Powermad
https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
https://github.com/Flangvik/AMSI.fail
https://github.com/p3nt4/PowerShdll
https://github.com/jaredhaight/PSAttack
https://github.com/cobbr/InsecurePowerShell
https://github.com/Mr-Un1k0d3r/PowerLessShell
https://github.com/tothi/PowerLessShell
https://github.com/bitsadmin/nopowershell
https://github.com/OmerYa/Invisi-Shell
https://github.com/Hackplayers/Salsa-tools
https://github.com/padovah4ck/PSByPassCLM
https://github.com/rasta-mouse/AmsiScanBufferBypass
https://github.com/itm4n/VBA-RunPE
https://github.com/cfalta/PowerShellArmoury
https://github.com/Mr-B0b/SpaceRunner
https://github.com/RythmStick/AMSITrigger
https://github.com/rmdavy/AMSI_Ordinal_Bypass
https://github.com/mgeeky/Stracciatella
https://github.com/med0x2e/NoAmci
https://github.com/rvrsh3ll/NoMSBuild
https://github.com/Cn33liz/MSBuildShell
https://github.com/secdev-01/AllTheThingsExec
https://github.com/cyberark/Evasor
https://github.com/tomcarver16/AmsiHook
https://github.com/G0ldenGunSec/SharpTransactedLoad
https://github.com/itm4n/PPLdump
https://github.com/kgretzky/pwndrop
https://github.com/sc0tfree/updog
https://github.com/SnaffCon/Snaffler
https://github.com/djhohnstein/SharpShares
https://github.com/vivami/SauronEye
https://github.com/leftp/VmdkReader
https://github.com/mitchmoser/SharpShares
https://github.com/xct/xc
https://github.com/cytopia/pwncat
https://github.com/Kudaes/LOLBITS
https://github.com/linuz/Sticky-Keys-Slayer
https://github.com/ztgrace/sticky_keys_hunter
https://github.com/countercept/doublepulsar-detection-script
https://github.com/0xthirteen/SharpRDP
https://github.com/0xthirteen/MoveKit
https://github.com/0xthirteen/SharpMove
https://github.com/rvrsh3ll/SharpCOM
https://github.com/malcomvetter/CSExec
https://github.com/byt3bl33d3r/CrackMapExec
https://github.com/cube0x0/SharpMapExec
https://github.com/nccgroup/WMIcmd
https://github.com/rasta-mouse/MiscTools
https://github.com/byt3bl33d3r/DeathStar
https://github.com/SpiderLabs/portia
https://github.com/Screetsec/Vegile
https://github.com/DanMcInerney/icebreaker
https://github.com/MooseDojo/apt2
https://github.com/hdm/nextnet
https://github.com/mubix/IOXIDResolver
https://github.com/Hackplayers/evil-winrm
https://github.com/bohops/WSMan-WinRM
https://github.com/dirkjanm/krbrelayx
https://github.com/Mr-Un1k0d3r/SCShell
https://github.com/rvazarkar/GMSAPasswordReader
https://github.com/fdiskyou/hunter
https://github.com/360-Linton-Lab/WMIHACKER
https://github.com/leechristensen/SpoolSample
https://github.com/cube0x0/SharpSystemTriggers
https://github.com/leftp/SpoolSamplerNET
https://github.com/topotam/PetitPotam
https://github.com/lexfo/rpc2socks
https://github.com/checkymander/sshiva
https://github.com/dev-2null/ADCollector
https://github.com/mez-0/MoveScheduler
https://github.com/GhostPack/RestrictedAdmin
https://github.com/RiccardoAncarani/LiquidSnake
https://github.com/Hackndo/WebclientServiceScanner
https://gist.github.com/gladiatx0r/1ffe59031d42c08603a3bde0ff678feb
https://github.com/dirkjanm/PKINITtools
https://github.com/juliourena/SharpNoPSExec
https://github.com/mubix/post-exploitation
https://github.com/emilyanncr/Windows-Post-Exploitation
https://github.com/nettitude/Invoke-PowerThIEf
https://github.com/ThunderGunExpress/BADministration
https://github.com/bohops/SharpRDPHijack
https://github.com/antonioCoco/RunasCs
https://github.com/klsecservices/Invoke-Vnc
https://github.com/mandatoryprogrammer/CursedChrome
https://github.com/djhohnstein/WireTap
https://github.com/GhostPack/Lockless
https://github.com/slyd0g/SharpClipboard
https://github.com/infosecn1nja/SharpDoor
https://github.com/qwqdanchum/MultiRDP
https://github.com/Yaxser/SharpPhish
https://github.com/eksperience/KnockOutlook
https://github.com/checkymander/Carbuncle
https://github.com/3gstudent/PasswordFilter
https://github.com/TheWover/CertStealer
https://github.com/swisskyrepo/SharpLAPS
https://github.com/n00py/LAPSDumper
https://github.com/hlldz/pickl3
https://github.com/shantanu561993/SharpLoginPrompt
https://github.com/Dviros/CredsLeaker
https://github.com/bitsadmin/fakelogonscreen
https://github.com/CCob/PinSwipe
https://github.com/IlanKalendarov/PyHook
https://github.com/IlanKalendarov/SharpHook
https://github.com/S3cur3Th1sSh1t/PowerSharpPack
https://github.com/bohops/GhostBuild
https://github.com/rvrsh3ll/Rubeus-Rundll32
https://github.com/checkymander/Zolom
https://github.com/0x36/VPNPivot
https://github.com/securesocketfunneling/ssf
https://github.com/p3nt4/Invoke-SocksProxy
https://github.com/sensepost/reGeorg
https://github.com/hayasec/reGeorg-Weblogic
https://github.com/nccgroup/ABPTTS
https://github.com/RedTeamOperations/PivotSuite
https://github.com/trustedsec/egressbuster
https://github.com/vincentcox/bypass-firewalls-by-DNS-history
https://github.com/shantanu561993/SharpChisel
https://github.com/jpillora/chisel
https://github.com/esrrhs/pingtunnel
https://github.com/sysdream/ligolo
https://github.com/tnpitsecurity/ligolo-ng
https://github.com/nccgroup/SocksOverRDP
https://github.com/blackarrowsec/mssqlproxy
https://github.com/zeronetworks/cornershot
https://github.com/blackarrowsec/pivotnacci
https://github.com/praetorian-inc/PortBender
https://github.com/klsecservices/rpivot
https://github.com/mwrlabs/SharpGPOAbuse
https://github.com/BloodHoundAD/BloodHound
https://github.com/BloodHoundAD/SharpHound3
https://github.com/chryzsh/awesome-bloodhound
https://github.com/hausec/Bloodhound-Custom-Queries
https://github.com/CompassSecurity/BloodHoundQueries
https://github.com/knavesec/Max
https://github.com/vletoux/pingcastle
https://github.com/cyberark/ACLight
https://github.com/canix1/ADACLScanner
https://github.com/fox-it/Invoke-ACLPwn
https://github.com/fox-it/aclpwn.py
https://github.com/dirkjanm/ldapdomaindump
https://github.com/tothi/rbcd-attack
https://github.com/NotMedic/NetNTLMtoSilverTicket
https://github.com/FatRodzianko/Get-RBCD-Threaded
https://github.com/NinjaStyle82/rbcd_permissions
https://github.com/GhostPack/Certify
https://github.com/ly4k/Certipy
https://github.com/zer1t0/certi
https://github.com/GhostPack/PSPKIAudit
https://github.com/cfalta/PoshADCS
https://github.com/Kevin-Robertson/Sharpmad
https://github.com/fireeye/SharPersist
https://github.com/outflanknl/SharpHide
https://github.com/HarmJ0y/DAMP
https://github.com/ShutdownRepo/pywhisker
https://github.com/Ridter/pyForgeCert
https://github.com/eladshamir/Whisker
https://github.com/GhostPack/ForgeCert
https://github.com/RedSection/printjacker
https://github.com/Tuhinshubhra/CMSeeK
https://github.com/Dionach/CMSmap
https://github.com/wpscanteam/wpscan
https://github.com/Ekultek/WhatWaf
https://github.com/wpscanteam/wpscan
https://github.com/n00py/WPForce
https://github.com/m4ll0k/WPSeku
https://github.com/swisskyrepo/Wordpresscan
https://github.com/rastating/wordpress-exploit-framework
https://github.com/coldfusion39/domi-owned
https://github.com/droope/droopescan
https://github.com/whoot/Typo-Enumerator
https://github.com/rezasp/joomscan
https://github.com/m4ll0k/WAScan
https://github.com/s0md3v/XSStrike
https://github.com/federicodotta/Java-Deserialization-Scanner
https://github.com/d3vilbug/HackBar
https://github.com/gyoisamurai/GyoiThon
https://github.com/snoopysecurity/awesome-burp-extensions
https://github.com/sting8k/BurpSuite_403Bypasser
https://github.com/BishopFox/GadgetProbe
https://github.com/scipag/vulscan
https://github.com/zdresearch/OWASP-Nettacker
https://github.com/OJ/gobuster
https://github.com/nccgroup/dirble
https://github.com/maK-/parameth
https://github.com/devanshbatham/ParamSpider
https://github.com/s0md3v/Arjun
https://github.com/Cillian-Collins/dirscraper
https://github.com/KathanP19/JSFScan.sh
https://github.com/hannob/snallygaster
https://github.com/maurosoria/dirsearch
https://github.com/s0md3v/Breacher
https://github.com/mazen160/server-status_PWN
https://github.com/jonaslejon/lolcrawler
https://github.com/s0md3v/Photon
https://github.com/kgretzky/dcrawl
https://github.com/lc/gau
https://github.com/OsandaMalith/LFiFreak
https://github.com/enjoiz/XXEinjector
https://github.com/tennc/webshell
https://github.com/flozz/p0wny-shell
https://github.com/epinna/tplmap
https://github.com/orf/xcat
https://github.com/almandin/fuxploider
https://github.com/nccgroup/freddy
https://github.com/irsdl/IIS-ShortName-Scanner
https://github.com/frohoff/ysoserial
https://github.com/pwntester/ysoserial.net
https://github.com/internetwache/GitTools
https://github.com/liamg/gitjacker
https://github.com/cujanovic/SSRF-Testing
https://github.com/ambionics/phpggc
https://github.com/BuffaloWill/oxml_xxe
https://github.com/tijme/angularjs-csti-scanner
https://github.com/0xacb/viewgen
https://github.com/Illuminopi/RCEvil.NET
https://github.com/microsoft/restler-fuzzer
https://github.com/flipkart-incubator/Astra
https://github.com/LuemmelSec/SAML2Spray
https://github.com/imperva/automatic-api-attack-tool
https://github.com/itm4n/PrivescCheck
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS
https://github.com/AlessandroZ/BeRoot
https://github.com/rasta-mouse/Sherlock
https://github.com/hfiref0x/UACME
https://github.com/FatRodzianko/SharpBypassUAC
https://github.com/AzAgarampur/byeintegrity8-uac
https://github.com/rootm0s/WinPwnage
https://github.com/abatchy17/WindowsExploits
https://github.com/dafthack/HostRecon
https://github.com/sensepost/rattler
https://github.com/WindowsExploits/Exploits
https://github.com/Cybereason/siofra
https://github.com/0xbadjuju/Tokenvator
https://github.com/MojtabaTajik/Robber
https://github.com/411Hall/JAWS
https://github.com/GhostPack/SharpUp
https://github.com/GhostPack/Seatbelt
https://github.com/A-mIn3/WINspect
https://github.com/hausec/ADAPE-Script
https://github.com/SecWiki/windows-kernel-exploits
https://github.com/bitsadmin/wesng
https://github.com/itm4n/Perfusion
https://github.com/gtworek/Priv2Admin
https://github.com/itm4n/UsoDllLoader
https://github.com/TsukiCTF/Lovely-Potato
https://github.com/antonioCoco/RogueWinRM
https://github.com/antonioCoco/RoguePotato
https://github.com/itm4n/PrintSpoofer
https://github.com/BeichenDream/BadPotato
https://github.com/zcgonvh/EfsPotato
https://github.com/antonioCoco/RemotePotato0
https://github.com/itm4n/FullPowers
https://github.com/quentinhardy/jndiat
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
https://github.com/mzet-/linux-exploit-suggester
https://github.com/rebootuser/LinEnum
https://github.com/diego-treitos/linux-smart-enumeration
https://github.com/CISOfy/lynis
https://github.com/AlessandroZ/BeRoot
https://github.com/future-architect/vuls
https://github.com/ngalongc/AutoLocalPrivilegeEscalation
https://github.com/b3rito/yodo
https://github.com/belane/linux-soft-exploit-suggester
https://github.com/sevagas/swap_digger
https://github.com/NullArray/RootHelper
https://github.com/NullArray/MIDA-Multitool
https://github.com/initstring/dirty_sock
https://github.com/jondonas/linux-exploit-suggester-2
https://github.com/sosdave/KeyTabExtract
https://github.com/DominicBreuker/pspy
https://github.com/itsKindred/modDetective
https://github.com/nongiach/sudo_inject
https://github.com/Anon-Exploiter/SUID3NUM
https://github.com/nccgroup/GTFOBLookup
https://github.com/TH3xACE/SUDO_KILLER
https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.py
https://github.com/inquisb/unix-privesc-check
https://github.com/hc0d3r/tas
https://github.com/SecWiki/linux-kernel-exploits
https://github.com/initstring/uptux
https://github.com/andrew-d/static-binaries
https://github.com/liamg/traitor
https://github.com/gentilkiwi/mimikatz
https://github.com/GhostPack/SafetyKatz
https://github.com/Flangvik/BetterSafetyKatz
https://github.com/GhostPack/Rubeus
https://github.com/ShutdownRepo/targetedKerberoast
https://github.com/Arvanaghi/SessionGopher
https://github.com/peewpw/Invoke-WCMDump
https://github.com/tiagorlampert/sAINT
https://github.com/AlessandroZ/LaZagneForensic
https://github.com/eladshamir/Internal-Monologue
https://github.com/djhohnstein/SharpWeb
https://github.com/moonD4rk/HackBrowserData
https://github.com/mwrlabs/SharpClipHistory
https://github.com/0x09AL/RdpThief
https://github.com/chrismaddalena/SharpCloud
https://github.com/djhohnstein/SharpChromium
https://github.com/rxwx/chlonium
https://github.com/V1V1/SharpScribbles
https://github.com/securesean/DecryptAutoLogon
https://github.com/G0ldenGunSec/SharpSecDump
https://github.com/EncodeGroup/Gopher
https://github.com/GhostPack/SharpDPAPI
https://github.com/Hackndo/lsassy
https://github.com/aas-n/spraykatz
https://github.com/b4rtik/SharpKatz
https://github.com/login-securite/DonPAPI
https://github.com/Barbarisch/forkatz
https://github.com/skelsec/pypykatz
https://github.com/codewhitesec/HandleKatz
https://github.com/m0rv4i/SafetyDump
https://github.com/CCob/MirrorDump
https://github.com/deepinstinct/LsassSilentProcessExit
https://github.com/outflanknl/Dumpert
https://github.com/cube0x0/MiniDump
https://github.com/b4rtik/SharpMiniDump
https://github.com/b4rtik/ATPMiniDump
https://github.com/aas-n/spraykatz
https://github.com/jfmaes/SharpHandler
https://github.com/huntergregal/mimipenguin
https://github.com/n1nj4sec/mimipy
https://github.com/dirtycow/dirtycow.github.io
https://github.com/mthbernardes/sshLooterC
https://github.com/blendin/3snake
https://github.com/0xmitsurugi/gimmecredz
https://github.com/TarlogicSecurity/tickey
https://github.com/FortyNorthSecurity/Egress-Assess
https://github.com/p3nt4/Invoke-TmpDavFS
https://github.com/DhavalKapil/icmptunnel
https://github.com/iagox86/dnscat2
https://github.com/Arno0x/DNSExfiltrator
https://github.com/spieglt/FlyingCarpet
https://github.com/SECFORCE/Tunna
https://github.com/sysdream/chashell
https://github.com/no0be/DNSlivery
https://github.com/mhaskar/DNSStager
https://github.com/Flangvik/SharpExfiltrate
https://github.com/dxa4481/truffleHog
https://github.com/zricethezav/gitleaks
https://github.com/adamtlangley/gitscraper
https://github.com/AlessandroZ/LaZagne
https://github.com/Dionach/PassHunt
https://github.com/vulmon/Vulmap
https://github.com/mattifestation/PowerShellArsenal
https://github.com/0xd4d/dnSpy
https://github.com/NationalSecurityAgency/ghidra
https://github.com/icsharpcode/ILSpy
https://github.com/Invoke-IR/PowerForensics
https://github.com/Neo23x0/Loki
https://github.com/gfoss/PSRecon
https://github.com/bettercap/bettercap
https://github.com/SpiderLabs/Responder
https://github.com/lgandx/Responder
https://github.com/evilsocket/bettercap
https://github.com/r00t-3xp10it/morpheus
https://github.com/fox-it/mitm6
https://github.com/Kevin-Robertson/InveighZero
https://github.com/mdsecactivebreach/Farmer
https://github.com/audibleblink/davil
https://github.com/mgeeky/SharpWebServer
https://github.com/DanMcInerney/LANs.py
https://github.com/jtesta/ssh-mitm
https://github.com/pimps/wsuxploit
https://github.com/GoSecure/WSuspicious
https://github.com/GoSecure/pywsus
https://github.com/SySS-Research/Seth
https://github.com/GoSecure/pyrdp
https://github.com/infobyte/evilgrade
https://github.com/samdenty/injectify
https://github.com/skorov/ridrelay
https://github.com/Kevin-Robertson/Invoke-TheHash
https://github.com/DanMcInerney/net-creds
https://github.com/odedshimon/BruteShark
https://github.com/lgandx/PCredz
https://github.com/Srinivas11789/PcapXray
https://github.com/outflanknl/RedELK
https://github.com/threat9/routersploit
https://github.com/nccgroup/autopwn
https://github.com/1N3/Sn1per
https://github.com/byt3bl33d3r/CrackMapExec
https://github.com/Cn33liz/p0wnedShell
https://github.com/archerysec/archerysec
https://github.com/vulnersCom/nmap-vulners
https://github.com/m4ll0k/AutoNSE
https://github.com/v3n0m-Scanner/V3n0M-Scanner
https://github.com/zdresearch/OWASP-Nettacker
https://github.com/rvrsh3ll/SharpSMBSpray
https://github.com/ztgrace/changeme
https://github.com/InfosecMatter/default-http-login-hunter
https://github.com/FortyNorthSecurity/EyeWitness
https://github.com/byt3bl33d3r/WitnessMe
https://github.com/ihebski/DefaultCreds-cheat-sheet
https://github.com/Viralmaniar/Passhunt
https://github.com/nccgroup/Winpayloads
https://github.com/Screetsec/TheFatRat
https://github.com/xillwillx/tricky.lnk
https://github.com/trustedsec/unicorn
https://github.com/z0noxz/powerstager
https://github.com/curi0usJack/luckystrike
https://github.com/enigma0x3/Generate-Macro
https://github.com/Cn33liz/JSMeter
https://github.com/Mr-Un1k0d3r/MaliciousMacroGenerator
https://github.com/Cn33liz/StarFighters
https://github.com/BorjaMerino/Pazuzu
https://github.com/mwrlabs/wePWNise
https://github.com/Mr-Un1k0d3r/UniByAv
https://github.com/govolution/avet
https://github.com/Pepitoh/VBad
https://github.com/mdsecactivebreach/CACTUSTORCH
https://github.com/D4Vinci/Dr0p1t-Framework
https://github.com/g0tmi1k/msfpc
https://github.com/bhdresh/CVE-2017-0199
https://github.com/jacob-baines/concealed_position
https://github.com/GreatSCT/GreatSCT
https://github.com/mthbernardes/rsg
https://github.com/sevagas/macro_pack
https://github.com/mdsecactivebreach/SharpShooter
https://github.com/hlldz/SpookFlare
https://github.com/0xdeadbeefJERKY/Office-DDE-Payloads
https://github.com/peewpw/Invoke-PSImage
https://github.com/Arvanaghi/CheckPlease
https://github.com/Aetsu/SLib
https://github.com/trustedsec/nps_payload
https://github.com/stormshadow07/HackTheWorld
https://github.com/r00t-3xp10it/FakeImageExploiter
https://github.com/nccgroup/demiguise
https://github.com/med0x2e/genxlm
https://github.com/med0x2e/GadgetToJScript
https://github.com/rasta-mouse/GadgetToJScript
https://github.com/EgeBalci/sgn
https://github.com/matterpreter/spotter
https://github.com/s0lst1c3/dropengine
https://github.com/gigajew/PowerDropper
https://github.com/FortyNorthSecurity/EXCELntDonut
https://github.com/Greenwolf/ntlm_theft
https://github.com/phackt/stager.dll
https://github.com/Arno0x/EmbedInHTML
https://github.com/bats3c/darkarmour
https://github.com/christophetd/spoofing-office-macro
https://github.com/infosecn1nja/MaliciousMacroMSBuild
https://github.com/outflanknl/EvilClippy
https://github.com/FortyNorthSecurity/EXCELntDonut
https://github.com/STMCyber/boobsnail
https://github.com/michaelweber/Macrome
https://github.com/aaaddress1/xlsKami
https://github.com/CCob/PwnyForm
https://github.com/fireeye/OfficePurge
https://github.com/TestingPens/CPLDropper
https://github.com/FortyNorthSecurity/hot-manchego
https://github.com/knight0x07/ImpulsiveDLLHijack
https://github.com/Flangvik/SharpDllProxy
https://github.com/jfmaes/Invoke-DLLClone
https://github.com/paranoidninja/CarbonCopy
https://github.com/Tylous/Limelighter
https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50
https://github.com/X-C3LL/xlsxPoison
https://github.com/med0x2e/SigFlip
https://github.com/klezVirus/inceptor
https://github.com/Inf0secRabbit/BadAssMacros
https://github.com/connormcgarr/LittleCorporal
https://github.com/hasherezade/process_ghosting
https://github.com/optiv/ScareCrow
https://github.com/persianhydra/Xeexe-TopAntivirusEvasion
https://github.com/TheWover/donut
https://github.com/rasta-mouse/RuralBishop
https://github.com/slyd0g/UrbanBishopLocal
https://github.com/FuzzySecurity/Sharp-Suite/tree/master/UrbanBishop
https://github.com/antonioCoco/Mapping-Injection
https://github.com/SolomonSklash/SyscallPOC
https://github.com/Arno0x/ShellcodeWrapper
https://github.com/Ne0nd0g/go-shellcode
https://github.com/djhohnstein/CSharpSetThreadContext
https://github.com/pwndizzle/c-sharp-memory-injection
https://github.com/jthuraisamy/SysWhispers2
https://github.com/mai1zhi2/SysWhispers2_x86
https://github.com/knownsec/shellcodeloader
https://github.com/djhohnstein/ScatterBrain
https://github.com/D00MFist/Go4aRun
https://github.com/sh4hin/GoPurple
https://github.com/C-Sto/BananaPhone
https://github.com/3xpl01tc0d3r/ProcessInjection
https://github.com/plackyhacker/Shellcode-Injection-Techniques
https://github.com/snovvcrash/DInjector
https://github.com/plackyhacker/Suspended-Thread-Injection
https://github.com/boku7/Ninja_UUID_Dropper
https://github.com/mobdk/Upsilon
https://github.com/0xDivyanshu/Injector
https://github.com/JohnWoodman/stealthInjector
https://github.com/xpn/NautilusProject
https://github.com/xinbailu/DripLoader
https://github.com/cribdragg3r/Alaris
https://github.com/theevilbit/injection
https://github.com/RomanRII/shellcode-through-ICMP
https://blog.romanrii.com/using-icmp-to-deliver-shellcode
https://github.com/ChaitanyaHaritash/Callback_Shellcode_Injection
https://github.com/ChoiSG/UuidShellcodeExec
https://github.com/S4R1N/AlternativeShellcodeExec
https://github.com/DamonMohammadbagher/NativePayload_CBT
https://github.com/S3cur3Th1sSh1t/Nim_CBT_Shellcode
https://github.com/med0x2e/ExecuteAssembly
https://github.com/EgeBalci/amber
https://github.com/djhohnstein/ScatterBrain
https://github.com/phra/PEzor
https://github.com/dretax/DynamicDllLoader
https://github.com/nettitude/RunPE
https://github.com/CCob/SharpBlock
https://github.com/bats3c/Ghost-In-The-Logs
https://github.com/am0nsec/SharpHellsGate
https://github.com/am0nsec/HellsGate
https://github.com/3gstudent/Windows-EventLog-Bypass
https://github.com/jfmaes/SharpNukeEventLog
https://github.com/Soledge/BlockEtw
https://github.com/ionescu007/faxhell
https://github.com/realoriginal/ppdump-public
https://github.com/bats3c/EvtMute
https://github.com/GetRektBoy724/TripleS
https://github.com/call-042PE/UCantSeeM3
https://github.com/bats3c/DarkLoadLibrary
https://github.com/moloch--/DarkLoadLibrary
https://github.com/scythe-io/memory-module-loader
https://github.com/Yaxser/Backstab
https://github.com/RedCursorSecurityConsulting/PPLKiller
https://github.com/passthehashbrowns/suspendedunhook
https://github.com/LloydLabs/delete-self-poc
https://github.com/klezVirus/SharpSelfDelete
https://github.com/jxy-s/herpaderping
https://github.com/bohops/UltimateWDACBypassList
https://github.com/mgeeky/ShellcodeFluctuation
https://github.com/mgeeky/ThreadStackSpoofer
https://github.com/SolomonSklash/SleepyCrypt
https://github.com/aaaddress1/PR0CESS
https://github.com/JLospinoso/gargoyle
https://github.com/passthehashbrowns/hiding-your-syscalls
https://github.com/hasherezade/module_overloading
https://github.com/forrest-orr/phantom-dll-hollower-poc
https://github.com/hasherezade/transacted_hollowing
https://github.com/GetRektBoy724/SharpUnhooker
https://github.com/mgeeky/UnhookMe
https://github.com/aaaddress1/wowInjector
https://github.com/RedSection/OffensivePH
https://github.com/optiv/Dent
https://github.com/Dewera/Pluto
https://github.com/jackullrich/universal-syscall-64
https://github.com/br-sn/CheekyBlinder
https://github.com/jthuraisamy/TelemetrySourcerer
https://github.com/TheWover/DInvoke
https://github.com/fashionproof/CheckSafeBoot
https://github.com/asaurusrex/DoppelGate
https://github.com/hasherezade/exe_to_dll
https://github.com/hasherezade/dll_to_exe
https://github.com/hasherezade/pe_to_shellcode
https://github.com/sensepost/kwetza
https://github.com/aboul3la/Sublist3r
https://github.com/TheRook/subbrute
https://github.com/michenriksen/aquatone
https://github.com/darkoperator/dnsrecon
https://github.com/fwaeytens/dnsenum
https://github.com/s0md3v/Striker
https://github.com/leebaird/discover
https://github.com/eldraco/domain_analyzer
https://github.com/caffix/amass
https://github.com/subfinder/subfinder
https://github.com/TypeError/domained
https://github.com/SilverPoision/Rock-ON
https://github.com/dafthack/PowerMeta
https://github.com/ElevenPaths/FOCA
https://github.com/vesche/scanless
https://github.com/1N3/Sn1per
https://github.com/DanMcInerney/pentest-machine
https://github.com/jaeles-project/jaeles
https://github.com/leapsecurity/InSpy
https://github.com/dchrastil/ScrapedIn
https://github.com/SimplySecurity/SimplyEmail
https://github.com/clr2of8/GatherContacts
https://github.com/s0md3v/Zen
https://github.com/m8r0wn/CrossLinked
https://github.com/m4ll0k/Infoga
https://github.com/navisecdelta/EmailGen
https://github.com/megadose/holehe
https://github.com/nyxgeek/o365recon
https://github.com/gremwell/o365enum
https://github.com/dafthack/MSOLSpray
https://github.com/sachinkamath/NTLMRecon
https://github.com/ustayready/fireprox
https://github.com/True-Demon/raindance
https://github.com/dafthack/MailSniper
https://github.com/sensepost/ruler
https://github.com/Greenwolf/Spray
https://github.com/nyxgeek/lyncsmash
https://github.com/byt3bl33d3r/SprayingToolkit
https://github.com/mdsecresearch/LyncSniper
https://github.com/3gstudent/easBrowseSharefile
https://github.com/FSecureLABS/peas
https://github.com/snovvcrash/peas
https://snovvcrash.rocks/2020/08/22/tuning-peas-for-fun-and-profit.html
https://github.com/RedLectroid/OutlookSend
https://github.com/nccgroup/Carnivore
https://github.com/ricardojoserf/adfsbrute
https://github.com/nyxgeek/onedrive_user_enum
https://github.com/nyxgeek/AzureAD_Autologon_Brute
https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
https://github.com/treebuilder/aad-sso-enum-brute-spray
https://github.com/SecurityRiskAdvisors/msspray
https://github.com/immunIT/TeamsUserEnum
https://github.com/knavesec/CredMaster
https://github.com/Airboi/CVE-2020-17144-EXP
https://github.com/Ridter/cve-2020-0688
https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2020-15505
https://github.com/galkan/crowbar
https://github.com/1N3/BruteX
https://github.com/x90skysn3k/brutespray
https://github.com/DarkCoderSc/win-brute-logon
https://github.com/lanjelot/patator
https://github.com/dafthack/RDPSpray
https://github.com/xFreed0m/RDPassSpray
https://github.com/hatlord/snmpwn
https://github.com/sensepost/xrdp
https://github.com/RUB-NDS/PRET
https://github.com/BusesCanFly/PRETty
https://github.com/quentinhardy/msdat
https://github.com/quentinhardy/odat
https://github.com/SpiderLabs/ikeforce
https://github.com/m8r0wn/nullinux
https://github.com/airbus-seclab/ilo4_toolbox
https://www.exploit-db.com/exploits/44005
https://github.com/guardicore/vmware_vcenter_cve_2020_3952
https://github.com/Coalfire-Research/DeathMetal
https://github.com/comaeio/OPCDE
https://github.com/gelim/sap_ms
https://github.com/chipik/SAP_GW_RCE_exploit
https://github.com/hannob/fpmvuln
https://github.com/0xn0ne/weblogicScanner
https://github.com/quentinhardy/jndiat
https://github.com/kingkaki/weblogic-scan
https://github.com/FlyfishSec/weblogic_rce
https://github.com/SukaraLin/CVE-2019-2890
https://github.com/1337g/CVE-2017-10271
https://github.com/LandGrey/CVE-2018-2894
https://github.com/Y4er/CVE-2020-2551
https://github.com/sensepost/SPartan
https://github.com/Voulnet/desharialize
https://github.com/0x48piraj/Jiraffe
https://github.com/darrenmartyn/VisualDoor
https://github.com/JamesCooteUK/SharpSphere
https://github.com/warferik/CVE-2019-3980
https://github.com/h3v0x/CVE-2021-26084_Confluence
https://github.com/noperator/CVE-2019-18935
https://github.com/FortyNorthSecurity/EyeWitness
https://github.com/mubix/solarflare
https://github.com/n1nj4sec/pupy
https://github.com/nettitude/PoshC2
https://github.com/FortyNorthSecurity/WMImplant
https://github.com/quasar/QuasarRAT
https://github.com/EmpireProject/Empire
https://github.com/zerosum0x0/koadic
https://github.com/Mr-Un1k0d3r/ThunderShell
https://github.com/Ne0nd0g/merlin
https://github.com/Arno0x/WebDavC2
https://github.com/malwaredllc/byob
https://github.com/byt3bl33d3r/SILENTTRINITY
https://github.com/SharpC2/SharpC2
https://github.com/Arno0x/WSC2
https://github.com/BC-SECURITY/Empire
https://github.com/cobbr/Covenant
https://github.com/cobbr/C2Bridge
https://github.com/py7hagoras/CovenantTasks
https://github.com/BishopFox/sliver
https://github.com/bats3c/shad0w
https://github.com/FSecureLABS/C3
https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp
https://github.com/its-a-feature/Mythic
https://github.com/Cr4sh/MicroBackdoor
https://github.com/cyberark/kubesploit
https://github.com/MythicAgents/Apollo
https://github.com/MythicAgents/Nimplant
https://github.com/JohnWoodman/VBA-Macro-Projects
https://github.com/karttoon/trigen
https://github.com/rmdavy/HeapsOfFun
https://github.com/S3cur3Th1sSh1t/OffensiveVBA
https://github.com/Kudaes/DInvoke_rs
https://github.com/trickster0/OffensiveRust
https://github.com/malware-unicorn/GoPEInjection
https://github.com/DeEpinGh0st/Erebus
https://github.com/aleenzz/Cobalt_Strike_wiki
https://github.com/FortyNorthSecurity/C2concealer
https://github.com/invokethreatguy/AggressorCollection
https://github.com/harleyQu1nn/AggressorScripts
https://github.com/mgeeky/cobalt-arsenal
https://github.com/xforcered/CredBandit
https://github.com/EncodeGroup/BOF-RegSave
https://github.com/EncodeGroup/AggressiveGadgetToJScript
https://github.com/rvrsh3ll/BOF_Collection
https://github.com/EspressoCake/HandleKatz_BOF
https://github.com/trustedsec/CS-Situational-Awareness-BOF
https://github.com/anthemtotheego/InlineExecute-Assembly
https://github.com/EspressoCake/Self_Deletion_BOF
https://github.com/EspressoCake/PPLDump_BOF
https://github.com/boku7/CobaltStrikeReflectiveLoader
https://github.com/optiv/Registry-Recon
https://github.com/Tylous/SourcePoint
https://github.com/boku7/spawn
https://github.com/OG-Sadpanda/SharpExcelibur
https://github.com/OG-Sadpanda/SharpSword
https://github.com/EncodeGroup/AggressiveProxy
https://github.com/mgeeky/RedWarden
https://github.com/rsmudge/unhook-bof
https://github.com/ajpc500/BOFs
https://github.com/outflanknl/InlineWhispers
https://github.com/AhMyth/AhMyth-Android-RAT
https://github.com/neoneggplant/EggShell
https://github.com/wifiphisher/wifiphisher
https://github.com/P0cL4bs/WiFi-Pumpkin
https://github.com/s0lst1c3/eaphammer
https://github.com/h0nus/RogueSploit
https://github.com/Tylous/SniffAir
https://github.com/FluxionNetwork/fluxion
https://github.com/derv82/wifite2
https://github.com/ICSec/airpwn-ng
https://github.com/xdavidhu/mitmAP
https://github.com/ZerBea/hcxdumptool
https://github.com/P0cL4bs/wifipumpkin3
https://github.com/faizann24/wifi-bruteforcer-fsecurify
https://github.com/chrisk44/Hijacker
https://github.com/samyk/slipstream
https://github.com/secgroundzero/warberry
https://github.com/samyk/poisontap
https://github.com/mame82/P4wnP1
https://github.com/mame82/P4wnP1_aloa
https://github.com/pi-hole/pi-hole
https://github.com/carmaa/inception
https://github.com/samratashok/Kautilya
https://github.com/ufrisk/pcileech
https://github.com/Screetsec/Brutal
https://github.com/insecurityofthings/jackit
https://github.com/BastilleResearch/mousejack
https://github.com/kgretzky/evilginx
https://github.com/threatexpress/domainhunter
https://github.com/netevert/dnsmorph
https://github.com/elceef/dnstwist
https://github.com/quickbreach/SMBetray
https://github.com/SteveLTN/https-portal
https://github.com/ryhanson/phishery
https://github.com/curtbraz/Phishing-API
https://github.com/CCob/BeaconEye
https://github.com/3lp4tr0n/BeaconHunter
https://github.com/IonizeCbr/AmsiPatchDetection
https://github.com/cisagov/Sparrow
https://github.com/meirwah/awesome-incident-response
https://github.com/CredDefense/CredDefense
https://github.com/PaulSec/awesome-windows-domain-hardening
https://github.com/ernw/hardening
https://github.com/Invoke-IR/Uproot
https://github.com/danielbohannon/Revoke-Obfuscation
https://github.com/NotPrab/.NET-Deobfuscator
https://github.com/countercept/python-exe-unpacker
https://github.com/0xd4d/de4dot
https://github.com/securitywithoutborders/hardentools
https://github.com/x0rz/phishing_catcher
https://github.com/Ben0xA/PowerShellDefense
https://github.com/emposha/PHP-Shell-Detector
https://github.com/LordNoteworthy/al-khaser
https://github.com/Security-Onion-Solutions/security-onion
https://github.com/ptresearch/AttackDetection
https://github.com/MHaggis/hunt-detect-prevent
https://github.com/JPCERTCC/LogonTracer
https://github.com/lithnet/ad-password-protection
https://github.com/R3MRUM/PSDecode
https://github.com/denisugarte/PowerDrive
https://github.com/matterpreter/DefenderCheck
https://github.com/rasta-mouse/ThreatCheck
https://github.com/hegusung/AVSignSeek
https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES
https://github.com/ION28/BLUESPAWN
https://github.com/hasherezade/hollows_hunter
https://github.com/hasherezade/pe-sieve
https://github.com/0Kee-Team/WatchAD
https://github.com/nsacyber/Mitigating-Web-Shells
https://github.com/redcanaryco/atomic-red-team
https://github.com/DamonMohammadbagher/ETWProcessMon2
https://github.com/p0dalirius/LDAPmonitor
https://github.com/PSGumshoe/PSGumshoe
https://github.com/rajiv2790/FalconEye
https://github.com/danielmiessler/SecLists
https://github.com/berzerk0/Probable-Wordlists
https://github.com/govolution/betterdefaultpasslist
https://github.com/insidetrust/statistically-likely-usernames
https://github.com/LandGrey/pydictor
https://github.com/sc0tfree/mentalist
https://github.com/skahwah/wordsmith
https://github.com/1N3/IntruderPayloads
https://github.com/fuzzdb-project/fuzzdb
https://github.com/Bo0oM/fuzz.txt
https://github.com/laconicwolf/Password-Scripts
https://github.com/FlameOfIgnis/Pwdb-Public
https://github.com/davidprowe/BadBlood
https://github.com/WazeHell/vulnerable-AD
https://github.com/clong/DetectionLab
https://github.com/xoreaxeaxeax/movfuscator
https://github.com/danielbohannon/Invoke-DOSfuscation
https://github.com/unixpickle/gobfuscate
https://github.com/NotPrab/.NET-Obfuscator
https://github.com/javascript-obfuscator/javascript-obfuscator
https://github.com/danielbohannon/Invoke-Obfuscation
https://github.com/BinaryScary/NET-Obfuscate
https://github.com/scrt/avcleaner
https://github.com/meme/hellscape
https://github.com/mgeeky/VisualBasicObfuscator
https://github.com/3xpl01tc0d3r/Obfuscator
https://github.com/EgeBalci/sgn
https://github.com/burrowers/garble
https://github.com/JustasMasiulis/xorstr
https://github.com/AnErrupTion/LoGiC.NET
https://github.com/klezVirus/chameleon
https://github.com/xforcered/InvisibilityCloak
https://github.com/Flangvik/RosFuscator
https://github.com/JoelGMSec/Invoke-Stealth
https://github.com/GetRektBoy724/BetterXencrypt
https://github.com/obfuscator-llvm/obfuscator
https://github.com/moloch--/denim
https://hashcat.net/hashcat/
https://github.com/Ciphey/Ciphey
https://github.com/Coalfire-Research/npk
https://github.com/JoelGMSec/Cloudtopolis
https://github.com/f0cker/crackq
https://github.com/avast/retdec
https://github.com/MobSF/Mobile-Security-Framework-MobSF
https://github.com/mre/awesome-static-analysis
https://github.com/eslint/eslint
https://github.com/dpnishant/jsprime
https://github.com/phpstan/phpstan
https://github.com/ecriminal/phpvuln
https://github.com/snovvcrash/NimHollow
https://github.com/jonaslejon/malicious-pdf
https://github.com/byt3bl33d3r/OffensiveNim
https://github.com/Yardanico/nim-strenc
https://github.com/ChaitanyaHaritash/NIM-Scripts
https://github.com/Moriarty2016/NimRDI
https://github.com/ajpc500/NimExamples
https://github.com/elddy/Nim-SMBExec
https://github.com/FedericoCeratto/nim-socks5
https://github.com/rvrsh3ll/TokenTactics
https://github.com/zer1t0/ticket_converter
https://github.com/pentestmonkey/gateway-finder
https://github.com/Cybellum/DoubleAgent
https://github.com/ytisf/theZoo
https://github.com/kbandla/APTnotes
https://github.com/WindowsLies/BlockWindows
https://github.com/secrary/InjectProc
https://github.com/AlsidOfficial/WSUSpendu
https://github.com/SigPloiter/SigPloit
https://github.com/virajkulkarni14/WebDeveloperSecurityChecklist
https://github.com/PowerShell/PowerShell
https://github.com/landhb/HideProcess
https://github.com/meliht/Mr.SIP
https://github.com/XiphosResearch/exploits
https://github.com/jas502n/CVE-2019-13272
https://github.com/fox-it/cve-2019-1040-scanner
https://github.com/worawit/MS17-010
https://github.com/DiabloHorn/yara4pentesters
https://github.com/D4Vinci/Cr3dOv3r
https://github.com/a2u/CVE-2018-7600
https://github.com/joxeankoret/CVE-2017-7494
https://github.com/D4Vinci/One-Lin3r
https://github.com/0x00-0x00/ShellPop
https://github.com/Acceis/crypto_identifier
https://github.com/sensepost/UserEnum
https://github.com/LOLBAS-Project/LOLBAS
https://github.com/peewpw/Invoke-BSOD
https://github.com/mtivadar/windows10_ntfs_crash_dos
https://github.com/deepzec/Bad-Pdf
https://github.com/SecureAuthCorp/impacket
https://github.com/blacknbunny/libSSH-Authentication-Bypass
https://github.com/OneLogicalMyth/zeroday-powershell
https://github.com/smicallef/spiderfoot
https://github.com/ShawnDEvans/smbmap
https://github.com/Coalfire-Research/java-deserialization-exploits
https://github.com/RhinoSecurityLabs/GCPBucketBrute
https://github.com/khast3x/h8mail
https://github.com/dirkjanm/adidnsdump
https://github.com/gquere/pwn_jenkins
https://github.com/JavelinNetworks/IR-Tools
https://github.com/taviso/ctftool
https://github.com/jedisct1/dsvpn
https://github.com/GoSecure/dtd-finder
https://github.com/tyranid/DotNetToJScript
https://github.com/cfreal/exploits
https://github.com/Al1ex/WindowsElevation
https://github.com/adamdriscoll/snek
https://github.com/g0tmi1k/exe2hex
https://github.com/beurtschipper/Depix
https://github.com/slaeryan/AQUARMOURY
https://github.com/mmozeiko/aes-finder
https://github.com/Flangvik/SharpCollection
https://github.com/CCob/MinHook.NET
https://github.com/Mr-Un1k0d3r/EDRs
https://github.com/jas502n/CVE-2020-5902
https://github.com/hausec/PowerZure
https://github.com/NetSPI/MicroBurst
https://github.com/dirkjanm/ROADtools
https://github.com/dafthack/CloudPentestCheatsheets
https://github.com/cyberark/BlobHunter
https://github.com/realgam3/pymultitor
https://github.com/Und3rf10w/kali-anonsurf
https://github.com/GouveaHeitor/nipe
https://github.com/cryptolok/GhostInTheNet
https://github.com/DanMcInerney/elite-proxy-finder
https://github.com/vulnersCom/getsploit
https://github.com/1N3/Findsploit
https://github.com/dark-lbp/isf
https://github.com/klsecservices/s7scan
https://github.com/w3h/isf
https://github.com/atimorin/scada-tools
https://github.com/scipag/nac_bypass
https://github.com/cedowens/Jenkins_Hunter_CSharp
https://github.com/petercunha/jenkins-rce
https://github.com/gquere/pwn_jenkins
https://medium.com/@adamyordan/a-case-study-on-jenkins-rce-c2558654f2ce
https://github.com/Accenture/jenkins-attack-framework
https://github.com/mogwailabs/mjet
https://github.com/siberas/sjet
https://github.com/qtc-de/beanshooter
https://github.com/mogwaisec/mjet
https://github.com/trustedsec/cve-2019-19781
https://github.com/vulnersCom/mikrot8over
https://github.com/obscuritylabs/RAI
https://github.com/Coalfire-Research/Red-Baron
https://github.com/qsecure-labs/overlord
https://github.com/rmikehodges/hideNsneak
https://github.com/shr3ddersec/Shr3dKit
https://github.com/t94j0/satellite
https://github.com/Cerbersec/DomainBorrowingC2
https://github.com/Dliv3/DomainBorrowing
https://github.com/chenjj/espoofer
https://github.com/n0b0dyCN/redis-rogue-server
https://github.com/Ridter/redis-rce
https://github.com/mgeeky/tomcatWarDeployer
https://github.com/00theway/Ghostcat-CNVD-2020-10487
https://github.com/Ridter/redis-rce
https://github.com/swisskyrepo/SSRFmap
https://github.com/mzfr/liffy
https://github.com/torque59/Nosql-Exploitation-Framework
https://github.com/Charlie-belmer/nosqli
https://github.com/luisfontes19/xxexploiter
https://github.com/0xbug/Biu-framework
https://github.com/NickstaDB/BaRMIe
https://github.com/BishopFox/rmiscout
https://github.com/ticarpi/jwt_tool
https://github.com/AbsoZed/DockerPwn.py
https://raw.githubusercontent.com/swisskyrepo/PayloadsAllTheThings/master/CVE%20Exploits/Docker%20API%20RCE.py
https://github.com/neex/phuip-fpizdam
https://github.com/mdsecactivebreach/o365-attack-toolkit
https://github.com/ojasookert/CVE-2017-0785
https://github.com/evilsocket/bleah
https://github.com/virtualabs/btlejack
https://github.com/mame82/LOGITacker
https://github.com/TryCatchHCF/DumpsterFire
https://github.com/NextronSystems/APTSimulator
https://github.com/redhuntlabs/RedHunt-OS
https://github.com/guardicore/monkey
https://github.com/k4m4/dcipher-cli
https://github.com/s0md3v/Hash-Buster
https://github.com/initstring/passphrase-wordlist
https://github.com/sailay1996/expl-bin
https://github.com/CyDefUnicorn/OSCP-Archives
https://github.com/antonioCoco/SharPyShell
https://github.com/flozz/p0wny-shell
https://github.com/nil0x42/phpsploit
https://github.com/gellin/bantam
https://github.com/SecurityRiskAdvisors/cmd.jsp
https://github.com/D3VI5H4/Antivirus-Artifacts
https://github.com/PwnDexter/SharpEDRChecker
https://github.com/Hack-with-Github/Awesome-Hacking
https://github.com/enaqx/awesome-pentest
https://github.com/HarmJ0y/CheatSheets
https://github.com/zhzyker/exphub
https://github.com/vysecurity/RedTips
https://github.com/toolswatch/blackhat-arsenal-tools
https://github.com/jivoi/awesome-osint
https://github.com/qazbnm456/awesome-cve-poc
https://github.com/swisskyrepo/PayloadsAllTheThings
https://github.com/dsasmblr/hacking-online-games
https://github.com/carpedm20/awesome-hacking
https://github.com/rshipp/awesome-malware-analysis
https://github.com/thibmaek/awesome-raspberry-pi
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://github.com/vitalysim/Awesome-Hacking-Resources
https://github.com/mre/awesome-static-analysis
https://github.com/coreb1t/awesome-pentest-cheat-sheets
https://github.com/infosecn1nja/Red-Teaming-Toolkit
https://github.com/rmusser01/Infosec_Reference
https://github.com/trimstray/the-book-of-secret-knowledge
https://github.com/N7WEra/SharpAllTheThings
https://github.com/3gstudent/Pentest-and-Development-Tips
https://github.com/qazbnm456/awesome-web-security
https://github.com/chryzsh/awesome-windows-security
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
https://github.com/We5ter/Scanners-Box
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/smgorelik/Windows-RCE-exploits
https://github.com/trustedsec/physical-docs
https://github.com/matterpreter/OffensiveCSharp
https://github.com/mgeeky/Penetration-Testing-Tools
https://github.com/nomi-sec/PoC-in-GitHub
https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
https://github.com/netbiosX/Checklists
https://github.com/Mr-Un1k0d3r/RedTeamCSharpScripts
https://github.com/adon90/pentest_compilation
https://github.com/sailay1996/awesome_windows_logical_bugs
https://github.com/EnableSecurity/awesome-rtc-hacking
https://github.com/api0cradle/UltimateAppLockerByPassList
https://github.com/hahwul/WebHackersWeapons
https://github.com/d0nkeys/redteam
https://github.com/d1pakda5/PowerShell-for-Pentesters
https://github.com/Mr-Un1k0d3r/RedTeamCSharpScripts
https://github.com/google/tsunami-security-scanner