πŸ§‘β€πŸ«Pentest-Tools

Pentest-Tools

And many more. I created this repo to have an overview over my starred repos. I was not able to filter in categories before. Feel free to use it for yourself. I do not list Kali default tools as well as several testing tools which are state of the art. STRG+F searches are helpful here.

Windows Active Directory Pentest

General usefull Powershell Scripts

https://github.com/S3cur3Th1sSh1t/WinPwnarrow-up-right - 😎

https://github.com/dafthack/MailSniperarrow-up-right

https://github.com/putterpanda/mimikittenzarrow-up-right

https://github.com/dafthack/DomainPasswordSprayarrow-up-right

https://github.com/mdavis332/DomainPasswordSprayarrow-up-right - same but kerberos auth for more stealth and lockout-sleep

https://github.com/jnqpblc/SharpSprayarrow-up-right - domainpasswordspray executable with lockout-sleep

https://github.com/Arvanaghi/SessionGopherarrow-up-right

https://github.com/samratashok/nishangarrow-up-right

https://github.com/PowerShellMafia/PowerSploitarrow-up-right

https://github.com/fdiskyou/PowerOPSarrow-up-right

https://github.com/giMini/PowerMemoryarrow-up-right

https://github.com/Kevin-Robertson/Inveigharrow-up-right

https://github.com/MichaelGrafnetter/DSInternalsarrow-up-right

https://github.com/PowerShellEmpire/PowerToolsarrow-up-right

https://github.com/FuzzySecurity/PowerShell-Suitearrow-up-right

https://github.com/hlldz/Invoke-Phant0marrow-up-right

https://github.com/leoloobeek/LAPSToolkitarrow-up-right

https://github.com/sense-of-security/ADReconarrow-up-right

https://github.com/adrecon/ADReconarrow-up-right - supported version - really nice Excel-Sheet for an AD-Overview

https://github.com/Arno0x/PowerShellScriptsarrow-up-right

https://github.com/S3cur3Th1sSh1t/Grouperarrow-up-right

https://github.com/l0ss/Grouper2arrow-up-right

https://github.com/NetSPI/PowerShellarrow-up-right

https://github.com/NetSPI/PowerUpSQLarrow-up-right

https://github.com/GhostPackarrow-up-right - Various Powersploit Tasks in C#

https://github.com/Kevin-Robertson/Powermadarrow-up-right - Adidns Attacks

AMSI Bypass restriction Bypass

https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershellarrow-up-right

https://github.com/Flangvik/AMSI.failarrow-up-right

https://github.com/p3nt4/PowerShdllarrow-up-right

https://github.com/jaredhaight/PSAttackarrow-up-right

https://github.com/cobbr/InsecurePowerShellarrow-up-right

https://github.com/Mr-Un1k0d3r/PowerLessShellarrow-up-right

https://github.com/tothi/PowerLessShellarrow-up-right - modified PowerLessShell

https://github.com/bitsadmin/nopowershellarrow-up-right C# Powershell

https://github.com/OmerYa/Invisi-Shellarrow-up-right

https://github.com/Hackplayers/Salsa-toolsarrow-up-right - Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP and AV bypass, AMSI patched

https://github.com/padovah4ck/PSByPassCLMarrow-up-right - Constrained language mode bypass

https://github.com/rasta-mouse/AmsiScanBufferBypassarrow-up-right

https://github.com/itm4n/VBA-RunPEarrow-up-right - Applocker Bypass

https://github.com/cfalta/PowerShellArmouryarrow-up-right

https://github.com/Mr-B0b/SpaceRunnerarrow-up-right - This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes through the use of runspace.

https://github.com/RythmStick/AMSITriggerarrow-up-right - The Hunt for Malicious Strings

https://github.com/rmdavy/AMSI_Ordinal_Bypassarrow-up-right - Bypass AMSI and Defender using Ordinal Values in VBS

https://github.com/mgeeky/Stracciatellaarrow-up-right - OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, CLM and Script Block Logging disabled at startup

https://github.com/med0x2e/NoAmciarrow-up-right - Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().

https://github.com/rvrsh3ll/NoMSBuildarrow-up-right - MSBuild without MSbuild.exe

https://github.com/Cn33liz/MSBuildShellarrow-up-right - MSBuildShell, a Powershell Host running within MSBuild.exe

https://github.com/secdev-01/AllTheThingsExecarrow-up-right - Executes Blended Managed/Unmanged Exports

https://github.com/cyberark/Evasorarrow-up-right - A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies / Applocker Bypass Scan

https://github.com/tomcarver16/AmsiHookarrow-up-right - AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.

https://github.com/G0ldenGunSec/SharpTransactedLoadarrow-up-right - Load .net assemblies from memory while having them appear to be loaded from an on-disk location.

https://github.com/itm4n/PPLdumparrow-up-right - Bypass LSA Protection - Dump the memory of a PPL with a userland exploit

Payload Hosting

https://github.com/kgretzky/pwndroparrow-up-right - Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

https://github.com/sc0tfree/updogarrow-up-right - Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.

Network Share Scanner

Find Juicy Stuff

https://github.com/SnaffCon/Snafflerarrow-up-right - a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4

https://github.com/djhohnstein/SharpSharesarrow-up-right - Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.

https://github.com/vivami/SauronEyearrow-up-right - Search tool to find specific files containing specific words, i.e. files containing passwords..

https://github.com/leftp/VmdkReaderarrow-up-right - .NET 4.0 Console App to browse VMDK / VHD images and extract files

https://github.com/mitchmoser/SharpSharesarrow-up-right - Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain

Reverse Shellz

https://github.com/xct/xcarrow-up-right - A small reverse shell for Linux & Windows

https://github.com/cytopia/pwncatarrow-up-right - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)

https://github.com/Kudaes/LOLBITSarrow-up-right - C# reverse shell using Background Intelligent Transfer Service (BITS) as communication protocol and direct syscalls for EDR user-mode hooking evasion.

Backdoor finder

https://github.com/linuz/Sticky-Keys-Slayerarrow-up-right

https://github.com/ztgrace/sticky_keys_hunterarrow-up-right

https://github.com/countercept/doublepulsar-detection-scriptarrow-up-right

Lateral Movement

https://github.com/0xthirteen/SharpRDParrow-up-right

https://github.com/0xthirteen/MoveKitarrow-up-right - WMI,SMB,RDP,SCM,DCOM Lateral Movement techniques

https://github.com/0xthirteen/SharpMovearrow-up-right - WMI, SCM, DCOM, Task Scheduler and more

https://github.com/rvrsh3ll/SharpCOMarrow-up-right - C# Port of Invoke-DCOM

https://github.com/malcomvetter/CSExecarrow-up-right - An implementation of PSExec in C#

https://github.com/byt3bl33d3r/CrackMapExecarrow-up-right

https://github.com/cube0x0/SharpMapExecarrow-up-right

https://github.com/nccgroup/WMIcmdarrow-up-right

https://github.com/rasta-mouse/MiscToolsarrow-up-right - CsExec, CsPosh (Remote Powershell Runspace), CsWMI,CsDCOM

https://github.com/byt3bl33d3r/DeathStararrow-up-right - Automate Getting Dom-Adm

https://github.com/SpiderLabs/portiaarrow-up-right - automated lateral movement

https://github.com/Screetsec/Vegilearrow-up-right - backdoor / rootkit

https://github.com/DanMcInerney/icebreakerarrow-up-right - automation for various mitm attacks + vulns

https://github.com/MooseDojo/apt2arrow-up-right - automated penetration toolkit

https://github.com/hdm/nextnetarrow-up-right - Netbios Network interface Enumeration (discovery of dual homed hosts)

https://github.com/mubix/IOXIDResolverarrow-up-right - Find dual homed hosts over DCOM

https://github.com/Hackplayers/evil-winrmarrow-up-right

https://github.com/bohops/WSMan-WinRMarrow-up-right - A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object

https://github.com/dirkjanm/krbrelayxarrow-up-right - unconstrained delegation, printer bug (MS-RPRN) exploitation, Remote ADIDNS attacks

https://github.com/Mr-Un1k0d3r/SCShellarrow-up-right - Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

https://github.com/rvazarkar/GMSAPasswordReaderarrow-up-right - AD Bloodhound 3.0 Path

https://github.com/fdiskyou/hunterarrow-up-right

https://github.com/360-Linton-Lab/WMIHACKERarrow-up-right - A Bypass Anti-virus Software Lateral Movement Command Execution Tool

https://github.com/leechristensen/SpoolSamplearrow-up-right - PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface.

https://github.com/cube0x0/SharpSystemTriggersarrow-up-right - Collection of remote authentication triggers in C#

https://github.com/leftp/SpoolSamplerNETarrow-up-right - Implementation of SpoolSample without rDLL

https://github.com/topotam/PetitPotamarrow-up-right - PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

https://github.com/lexfo/rpc2socksarrow-up-right - Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.

https://github.com/checkymander/sshivaarrow-up-right - C# application that allows you to quick run SSH commands against a host or list of hosts

https://github.com/dev-2null/ADCollectorarrow-up-right - A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.

https://github.com/mez-0/MoveSchedulerarrow-up-right - .NET 4.0 Scheduled Job Lateral Movement

https://github.com/GhostPack/RestrictedAdminarrow-up-right - Remotely enables Restricted Admin Mode

https://github.com/RiccardoAncarani/LiquidSnakearrow-up-right - LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript

https://github.com/Hackndo/WebclientServiceScannerarrow-up-right - Python tool to Check running WebClient services on multiple targets based on @leechristensen - https://gist.github.com/gladiatx0r/1ffe59031d42c08603a3bde0ff678febarrow-up-right

https://github.com/dirkjanm/PKINITtoolsarrow-up-right - Tools for Kerberos PKINIT and relaying to AD CS

https://github.com/juliourena/SharpNoPSExecarrow-up-right - Get file less command execution for lateral movement.

POST Exploitation

https://github.com/mubix/post-exploitationarrow-up-right

https://github.com/emilyanncr/Windows-Post-Exploitationarrow-up-right

https://github.com/nettitude/Invoke-PowerThIEfarrow-up-right - Automatically scan any windows or tabs for login forms and then record what gets posted. A notification will appear when some have arrived.

https://github.com/ThunderGunExpress/BADministrationarrow-up-right - McAfee Epo or Solarwinds post exploitation

https://github.com/bohops/SharpRDPHijackarrow-up-right - A POC Remote Desktop (RDP) session hijack utility for disconnected sessions

https://github.com/antonioCoco/RunasCsarrow-up-right - RunasCs - Csharp and open version of windows builtin runas.exe

https://github.com/klsecservices/Invoke-Vncarrow-up-right - Powershell VNC injector

https://github.com/mandatoryprogrammer/CursedChromearrow-up-right - Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.

https://github.com/djhohnstein/WireTaparrow-up-right - .NET 4.0 Project to interact with video, audio and keyboard hardware.

https://github.com/GhostPack/Locklessarrow-up-right - Lockless allows for the copying of locked files.

https://github.com/slyd0g/SharpClipboardarrow-up-right - C# Clipboard Monitor

https://github.com/infosecn1nja/SharpDoorarrow-up-right - SharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching termsrv.dll file.

https://github.com/qwqdanchum/MultiRDParrow-up-right - MultiRDP is a C# consosle application to make multiple RDP (Remote Desktop) sessions possible by patching termsrv.dll correctly.

https://github.com/Yaxser/SharpPhisharrow-up-right - Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.

https://github.com/eksperience/KnockOutlookarrow-up-right - A little tool to play with Outlook

https://github.com/checkymander/Carbunclearrow-up-right - Tool for interacting with outlook interop during red team engagements

https://github.com/3gstudent/PasswordFilterarrow-up-right - 2 ways of Password Filter DLL to record the plaintext password

https://github.com/TheWover/CertStealerarrow-up-right - A .NET tool for exporting and importing certificates without touching disk.

https://github.com/swisskyrepo/SharpLAPSarrow-up-right - Retrieve LAPS password from LDAP

https://github.com/n00py/LAPSDumperarrow-up-right - remote LAPS dumping from linux

Post Exploitation - Phish Credentials

https://github.com/hlldz/pickl3arrow-up-right - Windows active user credential phishing tool

https://github.com/shantanu561993/SharpLoginPromptarrow-up-right - Creates a login prompt to gather username and password of the current user. This project allows red team to phish username and password of the current user without touching lsass and having adminitrator credentials on the system.

https://github.com/Dviros/CredsLeakerarrow-up-right

https://github.com/bitsadmin/fakelogonscreenarrow-up-right

https://github.com/CCob/PinSwipearrow-up-right - Phish Smartcard PIN

https://github.com/IlanKalendarov/PyHookarrow-up-right - PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.

https://github.com/IlanKalendarov/SharpHookarrow-up-right - SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.

Wrapper for various tools

https://github.com/S3cur3Th1sSh1t/PowerSharpPackarrow-up-right - Various .NET Tools wrapped in Powershell

https://github.com/bohops/GhostBuildarrow-up-right - GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects

https://github.com/rvrsh3ll/Rubeus-Rundll32arrow-up-right - rundll32 Wrapper for Rubeus

https://github.com/checkymander/Zolomarrow-up-right - execute Python in C# via ironpython

Pivot

https://github.com/0x36/VPNPivotarrow-up-right

https://github.com/securesocketfunneling/ssfarrow-up-right

https://github.com/p3nt4/Invoke-SocksProxyarrow-up-right

https://github.com/sensepost/reGeorgarrow-up-right - Webshell tunnel over socks proxy - pentesters dream

https://github.com/hayasec/reGeorg-Weblogicarrow-up-right - reGeorg customized for weblogic

https://github.com/nccgroup/ABPTTSarrow-up-right TCP tunneling over HTTP/HTTPS for web application servers like reGeorg

https://github.com/RedTeamOperations/PivotSuitearrow-up-right

https://github.com/trustedsec/egressbusterarrow-up-right - check for internet access over open ports / egress filtering

https://github.com/vincentcox/bypass-firewalls-by-DNS-historyarrow-up-right

https://github.com/shantanu561993/SharpChiselarrow-up-right - C# Wrapper around Chisel from

https://github.com/jpillora/chiselarrow-up-right - A fast TCP tunnel over HTTP

https://github.com/esrrhs/pingtunnelarrow-up-right - ping tunnel is a tool that advertises tcp/udp/socks5 traffic as icmp traffic for forwarding.

https://github.com/sysdream/ligoloarrow-up-right - Reverse Tunneling made easy for pentesters, by pentesters

https://github.com/tnpitsecurity/ligolo-ngarrow-up-right - An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

https://github.com/nccgroup/SocksOverRDParrow-up-right - Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop

https://github.com/blackarrowsec/mssqlproxyarrow-up-right - mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse

https://github.com/zeronetworks/cornershotarrow-up-right - Amplify network visibility from multiple POV of other hosts

https://github.com/blackarrowsec/pivotnacciarrow-up-right - A tool to make socks connections through HTTP agents

https://github.com/praetorian-inc/PortBenderarrow-up-right - TCP Port Redirection Utility

https://github.com/klsecservices/rpivotarrow-up-right - socks4 reverse proxy for penetration testing

Active Directory Audit and exploit tools

https://github.com/mwrlabs/SharpGPOAbusearrow-up-right

https://github.com/BloodHoundAD/BloodHoundarrow-up-right

https://github.com/BloodHoundAD/SharpHound3arrow-up-right - C# Data Collector for the BloodHound Project, Version 3

https://github.com/chryzsh/awesome-bloodhoundarrow-up-right

https://github.com/hausec/Bloodhound-Custom-Queriesarrow-up-right

https://github.com/CompassSecurity/BloodHoundQueriesarrow-up-right

https://github.com/knavesec/Maxarrow-up-right - Maximizing BloodHound. Max is a good boy.

https://github.com/vletoux/pingcastlearrow-up-right

https://github.com/cyberark/ACLightarrow-up-right

https://github.com/canix1/ADACLScannerarrow-up-right

https://github.com/fox-it/Invoke-ACLPwnarrow-up-right

https://github.com/fox-it/aclpwn.pyarrow-up-right - same as invoke-aclpwn but in python

https://github.com/dirkjanm/ldapdomaindumparrow-up-right - Active Directory information dumper via LDAP

https://github.com/tothi/rbcd-attackarrow-up-right - Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket

https://github.com/NotMedic/NetNTLMtoSilverTicketarrow-up-right - SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket

https://github.com/FatRodzianko/Get-RBCD-Threadedarrow-up-right - Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments

https://github.com/NinjaStyle82/rbcd_permissionsarrow-up-right - Add SD for controlled computer object to a target object for RBCD using LDAP

https://github.com/GhostPack/Certifyarrow-up-right - Active Directory certificate abuse.

https://github.com/ly4k/Certipyarrow-up-right - Python implementation for Active Directory certificate abuse

https://github.com/zer1t0/certiarrow-up-right - ADCS abuser

https://github.com/GhostPack/PSPKIAuditarrow-up-right - PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.

https://github.com/cfalta/PoshADCSarrow-up-right - A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)

https://github.com/Kevin-Robertson/Sharpmadarrow-up-right - C# version of Powermad

Persistence on windows

https://github.com/fireeye/SharPersistarrow-up-right

https://github.com/outflanknl/SharpHidearrow-up-right

https://github.com/HarmJ0y/DAMParrow-up-right - The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification

https://github.com/ShutdownRepo/pywhiskerarrow-up-right - Python version of the C# tool for "Shadow Credentials" attacks

https://github.com/Ridter/pyForgeCertarrow-up-right - pyForgeCert is a Python equivalent of the ForgeCert.

https://github.com/eladshamir/Whiskerarrow-up-right - Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.

https://github.com/GhostPack/ForgeCertarrow-up-right - "Golden" certificates

https://github.com/RedSection/printjackerarrow-up-right - Hijack Printconfig.dll to execute shellcode

Web Application Pentest

Framework Discovery

https://github.com/Tuhinshubhra/CMSeeKarrow-up-right

https://github.com/Dionach/CMSmaparrow-up-right - Wordpress, Joomla, Drupal Scanner

https://github.com/wpscanteam/wpscanarrow-up-right

https://github.com/Ekultek/WhatWafarrow-up-right

Framework Scanner / Exploitation

https://github.com/wpscanteam/wpscanarrow-up-right - wordpress

https://github.com/n00py/WPForcearrow-up-right

https://github.com/m4ll0k/WPSekuarrow-up-right

https://github.com/swisskyrepo/Wordpresscanarrow-up-right

https://github.com/rastating/wordpress-exploit-frameworkarrow-up-right

https://github.com/coldfusion39/domi-ownedarrow-up-right - lotus domino

https://github.com/droope/droopescanarrow-up-right - Drupal

https://github.com/whoot/Typo-Enumeratorarrow-up-right - Typo3

https://github.com/rezasp/joomscanarrow-up-right - Joomla

Web Vulnerability Scanner / Burp Plugins

https://github.com/m4ll0k/WAScanarrow-up-right - all in one scanner

https://github.com/s0md3v/XSStrikearrow-up-right - XSS discovery

https://github.com/federicodotta/Java-Deserialization-Scannerarrow-up-right

https://github.com/d3vilbug/HackBararrow-up-right

https://github.com/gyoisamurai/GyoiThonarrow-up-right

https://github.com/snoopysecurity/awesome-burp-extensionsarrow-up-right

https://github.com/sting8k/BurpSuite_403Bypasserarrow-up-right - Burpsuite Extension to bypass 403 restricted directory

https://github.com/BishopFox/GadgetProbearrow-up-right - Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.

Network- / Service-level Vulnerability Scanner

https://github.com/scipag/vulscanarrow-up-right

https://github.com/zdresearch/OWASP-Nettackerarrow-up-right

File / Directory / Parameter discovery

https://github.com/OJ/gobusterarrow-up-right

https://github.com/nccgroup/dirblearrow-up-right

https://github.com/maK-/parametharrow-up-right

https://github.com/devanshbatham/ParamSpiderarrow-up-right - Mining parameters from dark corners of Web Archives

https://github.com/s0md3v/Arjunarrow-up-right - πŸ’—

https://github.com/Cillian-Collins/dirscraperarrow-up-right - Directory lookup from Javascript files

https://github.com/KathanP19/JSFScan.sharrow-up-right - Automation for javascript recon in bug bounty.

https://github.com/hannob/snallygasterarrow-up-right

https://github.com/maurosoria/dirsearcharrow-up-right

https://github.com/s0md3v/Breacherarrow-up-right - Admin Panel Finder

https://github.com/mazen160/server-status_PWNarrow-up-right

Crawler

https://github.com/jonaslejon/lolcrawlerarrow-up-right - Headless web crawler for bugbounty and penetration-testing/redteaming

https://github.com/s0md3v/Photonarrow-up-right - πŸ’—

https://github.com/kgretzky/dcrawlarrow-up-right

https://github.com/lc/gauarrow-up-right - Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.

Web Exploitation Tools

https://github.com/OsandaMalith/LFiFreakarrow-up-right - lfi

https://github.com/enjoiz/XXEinjectorarrow-up-right - xxe

https://github.com/tennc/webshellarrow-up-right - shellz

https://github.com/flozz/p0wny-shellarrow-up-right

https://github.com/epinna/tplmaparrow-up-right - ssti

https://github.com/orf/xcatarrow-up-right - xpath injection

https://github.com/almandin/fuxploiderarrow-up-right - File Uploads

https://github.com/nccgroup/freddyarrow-up-right - deserialization

https://github.com/irsdl/IIS-ShortName-Scannerarrow-up-right - IIS Short Filename Vuln. exploitation

https://github.com/frohoff/ysoserialarrow-up-right - Deserialize Java Exploitation

https://github.com/pwntester/ysoserial.netarrow-up-right - Deserialize .NET Exploitation

https://github.com/internetwache/GitToolsarrow-up-right - Exploit .git Folder Existence

https://github.com/liamg/gitjackerarrow-up-right - Leak git repositories from misconfigured websites

https://github.com/cujanovic/SSRF-Testingarrow-up-right - SSRF Tutorials

https://github.com/ambionics/phpggcarrow-up-right - PHP Unserialize Payload generator

https://github.com/BuffaloWill/oxml_xxearrow-up-right - Malicious Office XXE payload generator

https://github.com/tijme/angularjs-csti-scannerarrow-up-right - Angularjs Csti Scanner

https://github.com/0xacb/viewgenarrow-up-right - Deserialize .NET Viewstates

https://github.com/Illuminopi/RCEvil.NETarrow-up-right - Deserialize .NET Viewstates

REST API Audit

https://github.com/microsoft/restler-fuzzerarrow-up-right - RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.

https://github.com/flipkart-incubator/Astraarrow-up-right

SAML Login

https://github.com/LuemmelSec/SAML2Sprayarrow-up-right - Python Script for SAML2 Authentication Passwordspray

Swagger File API Attack

https://github.com/imperva/automatic-api-attack-toolarrow-up-right

Windows Privilege Escalation / Audit

https://github.com/itm4n/PrivescCheckarrow-up-right - Privilege Escalation Enumeration Script for Windows

https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEASarrow-up-right - powerfull Privilege Escalation Check Script with nice output

https://github.com/AlessandroZ/BeRootarrow-up-right

https://github.com/rasta-mouse/Sherlockarrow-up-right

https://github.com/hfiref0x/UACMEarrow-up-right - UAC

https://github.com/FatRodzianko/SharpBypassUACarrow-up-right - C# tool for UAC bypasses

https://github.com/AzAgarampur/byeintegrity8-uacarrow-up-right - Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components

https://github.com/rootm0s/WinPwnagearrow-up-right - UAC

https://github.com/abatchy17/WindowsExploitsarrow-up-right

https://github.com/dafthack/HostReconarrow-up-right

https://github.com/sensepost/rattlerarrow-up-right - find vulnerable dlls for preloading attack

https://github.com/WindowsExploits/Exploitsarrow-up-right

https://github.com/Cybereason/siofraarrow-up-right - dll hijack scanner

https://github.com/0xbadjuju/Tokenvatorarrow-up-right - admin to system

https://github.com/MojtabaTajik/Robberarrow-up-right

https://github.com/411Hall/JAWSarrow-up-right

https://github.com/GhostPack/SharpUparrow-up-right

https://github.com/GhostPack/Seatbeltarrow-up-right

https://github.com/A-mIn3/WINspectarrow-up-right

https://github.com/hausec/ADAPE-Scriptarrow-up-right

https://github.com/SecWiki/windows-kernel-exploitsarrow-up-right

https://github.com/bitsadmin/wesngarrow-up-right

https://github.com/itm4n/Perfusionarrow-up-right - Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)

Windows Privilege Abuse (Privilege Escalation)

https://github.com/gtworek/Priv2Adminarrow-up-right - Abuse Windows Privileges

https://github.com/itm4n/UsoDllLoaderarrow-up-right - load malicious dlls from system32

https://github.com/TsukiCTF/Lovely-Potatoarrow-up-right - Exploit potatoes with automation

https://github.com/antonioCoco/RogueWinRMarrow-up-right - from Service Account to System

https://github.com/antonioCoco/RoguePotatoarrow-up-right - Another Windows Local Privilege Escalation from Service Account to System

https://github.com/itm4n/PrintSpooferarrow-up-right - Abusing Impersonation Privileges on Windows 10 and Server 2019

https://github.com/BeichenDream/BadPotatoarrow-up-right - itm4ns Printspoofer in C#

https://github.com/zcgonvh/EfsPotatoarrow-up-right - Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).

https://github.com/antonioCoco/RemotePotato0arrow-up-right - Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.

https://github.com/itm4n/FullPowersarrow-up-right - Recover the default privilege set of a LOCAL/NETWORK SERVICE account

T3 Enumeration

https://github.com/quentinhardy/jndiatarrow-up-right

Linux Privilege Escalation / Audit

https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEASarrow-up-right - powerfull Privilege Escalation Check Script with nice output

https://github.com/mzet-/linux-exploit-suggesterarrow-up-right

https://github.com/rebootuser/LinEnumarrow-up-right

https://github.com/diego-treitos/linux-smart-enumerationarrow-up-right

https://github.com/CISOfy/lynisarrow-up-right

https://github.com/AlessandroZ/BeRootarrow-up-right

https://github.com/future-architect/vulsarrow-up-right

https://github.com/ngalongc/AutoLocalPrivilegeEscalationarrow-up-right

https://github.com/b3rito/yodoarrow-up-right

https://github.com/belane/linux-soft-exploit-suggesterarrow-up-right - lookup vulnerable installed software

https://github.com/sevagas/swap_diggerarrow-up-right

https://github.com/NullArray/RootHelperarrow-up-right

https://github.com/NullArray/MIDA-Multitoolarrow-up-right

https://github.com/initstring/dirty_sockarrow-up-right

https://github.com/jondonas/linux-exploit-suggester-2arrow-up-right

https://github.com/sosdave/KeyTabExtractarrow-up-right

https://github.com/DominicBreuker/pspyarrow-up-right

https://github.com/itsKindred/modDetectivearrow-up-right

https://github.com/nongiach/sudo_injectarrow-up-right

https://github.com/Anon-Exploiter/SUID3NUMarrow-up-right - find suid bins and look them up under gtfobins / exploitable or not

https://github.com/nccgroup/GTFOBLookuparrow-up-right - Offline GTFOBins

https://github.com/TH3xACE/SUDO_KILLERarrow-up-right - sudo misconfiguration exploitation

https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.pyarrow-up-right

https://github.com/inquisb/unix-privesc-checkarrow-up-right

https://github.com/hc0d3r/tasarrow-up-right - easily manipulate the tty and create fake binaries

https://github.com/SecWiki/linux-kernel-exploitsarrow-up-right

https://github.com/initstring/uptuxarrow-up-right

https://github.com/andrew-d/static-binariesarrow-up-right - not really privesc but helpfull

https://github.com/liamg/traitorarrow-up-right - Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket

Exfiltration

Credential harvesting Windows Specific

https://github.com/gentilkiwi/mimikatzarrow-up-right

https://github.com/GhostPack/SafetyKatzarrow-up-right

https://github.com/Flangvik/BetterSafetyKatzarrow-up-right - Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into memory.

https://github.com/GhostPack/Rubeusarrow-up-right

https://github.com/ShutdownRepo/targetedKerberoastarrow-up-right - Kerberoast with ACL abuse capabilities

https://github.com/Arvanaghi/SessionGopherarrow-up-right

https://github.com/peewpw/Invoke-WCMDumparrow-up-right

https://github.com/tiagorlampert/sAINTarrow-up-right

https://github.com/AlessandroZ/LaZagneForensicarrow-up-right - remote lazagne

https://github.com/eladshamir/Internal-Monologuearrow-up-right

https://github.com/djhohnstein/SharpWebarrow-up-right - Browser Creds gathering

https://github.com/moonD4rk/HackBrowserDataarrow-up-right - hack-browser-data is an open-source tool that could help you decrypt data[passwords|bookmarks|cookies|history] from the browser.

https://github.com/mwrlabs/SharpClipHistoryarrow-up-right - ClipHistory feature get the last 25 copy paste actions

https://github.com/0x09AL/RdpThiefarrow-up-right - extract live rdp logins

https://github.com/chrismaddalena/SharpCloudarrow-up-right - Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.

https://github.com/djhohnstein/SharpChromiumarrow-up-right - .NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.

https://github.com/rxwx/chloniumarrow-up-right - Chromium Cookie import / export tool

https://github.com/V1V1/SharpScribblesarrow-up-right - ThunderFox for Firefox Credentials, SitkyNotesExtract for "Notes as passwords"

https://github.com/securesean/DecryptAutoLogonarrow-up-right - Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon

https://github.com/G0ldenGunSec/SharpSecDumparrow-up-right - .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py

https://github.com/EncodeGroup/Gopherarrow-up-right - C# tool to discover low hanging fruits like SessionGopher

https://github.com/GhostPack/SharpDPAPIarrow-up-right - DPAPI Creds via C#

https://github.com/Hackndo/lsassyarrow-up-right

https://github.com/aas-n/spraykatzarrow-up-right

https://github.com/b4rtik/SharpKatzarrow-up-right - C# porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands

https://github.com/login-securite/DonPAPIarrow-up-right - Dumping DPAPI credz remotely

https://github.com/Barbarisch/forkatzarrow-up-right - credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege

https://github.com/skelsec/pypykatzarrow-up-right - Mimikatz implementation in pure Python

LSASS dumper / process dumper

https://github.com/codewhitesec/HandleKatzarrow-up-right - PIC lsass dumper using cloned handles

https://github.com/m0rv4i/SafetyDumparrow-up-right - Dump stuff without touching disk

https://github.com/CCob/MirrorDumparrow-up-right - Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory

https://github.com/deepinstinct/LsassSilentProcessExitarrow-up-right - Command line interface to dump LSASS memory to disk via SilentProcessExit

https://github.com/outflanknl/Dumpertarrow-up-right - dump lsass using direct system calls and API unhooking

https://github.com/cube0x0/MiniDumparrow-up-right - C# Lsass parser

https://github.com/b4rtik/SharpMiniDumparrow-up-right - Create a minidump of the LSASS process from memory - using Dumpert

https://github.com/b4rtik/ATPMiniDumparrow-up-right - Evade WinDefender ATP credential-theft

https://github.com/aas-n/spraykatzarrow-up-right - remote procdump.exe, copy dump file to local system and pypykatz for analysis/extraction

https://github.com/jfmaes/SharpHandlerarrow-up-right - This project reuses open handles to lsass to parse or minidump lsass

Credential harvesting Linux Specific

https://github.com/huntergregal/mimipenguinarrow-up-right

https://github.com/n1nj4sec/mimipyarrow-up-right

https://github.com/dirtycow/dirtycow.github.ioarrow-up-right

https://github.com/mthbernardes/sshLooterCarrow-up-right - SSH Credential loot

https://github.com/blendin/3snakearrow-up-right - SSH / Sudo / SU Credential loot

https://github.com/0xmitsurugi/gimmecredzarrow-up-right

https://github.com/TarlogicSecurity/tickeyarrow-up-right - Tool to extract Kerberos tickets from Linux kernel keys.

Data Exfiltration - DNS/ICMP/Wifi Exfiltration

https://github.com/FortyNorthSecurity/Egress-Assessarrow-up-right

https://github.com/p3nt4/Invoke-TmpDavFSarrow-up-right

https://github.com/DhavalKapil/icmptunnelarrow-up-right

https://github.com/iagox86/dnscat2arrow-up-right

https://github.com/Arno0x/DNSExfiltratorarrow-up-right

https://github.com/spieglt/FlyingCarpetarrow-up-right - Wifi Exfiltration

https://github.com/SECFORCE/Tunnaarrow-up-right - Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP

https://github.com/sysdream/chashellarrow-up-right

https://github.com/no0be/DNSliveryarrow-up-right - Easy files and payloads delivery over DNS

https://github.com/mhaskar/DNSStagerarrow-up-right - Hide your payload in DNS

https://github.com/Flangvik/SharpExfiltratearrow-up-right - Modular C# framework to exfiltrate loot over secure and trusted channels.

Git Specific

https://github.com/dxa4481/truffleHogarrow-up-right

https://github.com/zricethezav/gitleaksarrow-up-right

https://github.com/adamtlangley/gitscraperarrow-up-right

Windows / Linux

https://github.com/AlessandroZ/LaZagnearrow-up-right

https://github.com/Dionach/PassHuntarrow-up-right

https://github.com/vulmon/Vulmaparrow-up-right

Reverse Engineering / decompiler

https://github.com/mattifestation/PowerShellArsenalarrow-up-right

https://github.com/0xd4d/dnSpyarrow-up-right - .NET Disassembler

https://github.com/NationalSecurityAgency/ghidraarrow-up-right

https://github.com/icsharpcode/ILSpyarrow-up-right

Forensics

https://github.com/Invoke-IR/PowerForensicsarrow-up-right

https://github.com/Neo23x0/Lokiarrow-up-right

https://github.com/gfoss/PSReconarrow-up-right

Network Attacks

https://github.com/bettercap/bettercaparrow-up-right - πŸ’—

https://github.com/SpiderLabs/Responderarrow-up-right

https://github.com/lgandx/Responderarrow-up-right - more up to date

https://github.com/evilsocket/bettercaparrow-up-right - Deprecated but still good

https://github.com/r00t-3xp10it/morpheusarrow-up-right

https://github.com/fox-it/mitm6arrow-up-right

https://github.com/Kevin-Robertson/InveighZeroarrow-up-right - mitm6 in C# + Inveigh default features

https://github.com/mdsecactivebreach/Farmerarrow-up-right - Farmer is a project for collecting NetNTLM hashes in a Windows domain. Farmer achieves this by creating a local WebDAV server that causes the WebDAV Mini Redirector to authenticate from any connecting clients.

https://github.com/audibleblink/davilarrow-up-right - leaking net-ntlm with webdav

https://github.com/mgeeky/SharpWebServerarrow-up-right - Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality

https://github.com/DanMcInerney/LANs.pyarrow-up-right

Specific MITM service Exploitation

https://github.com/jtesta/ssh-mitmarrow-up-right - SSH

https://github.com/pimps/wsuxploitarrow-up-right - WSUS

https://github.com/GoSecure/WSuspiciousarrow-up-right - WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations

https://github.com/GoSecure/pywsusarrow-up-right - WSUS mitm - Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.

https://github.com/SySS-Research/Setharrow-up-right - RDP

https://github.com/GoSecure/pyrdparrow-up-right - RDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact

https://github.com/infobyte/evilgradearrow-up-right - Fake Updates for various Software

https://github.com/samdenty/injectifyarrow-up-right - web application live recording, keystroke logger

https://github.com/skorov/ridrelayarrow-up-right - User Enumeration with SMB Relay Attacks

https://github.com/Kevin-Robertson/Invoke-TheHasharrow-up-right

Sniffing / Evaluation / Filtering

https://github.com/DanMcInerney/net-credsarrow-up-right

https://github.com/odedshimon/BruteSharkarrow-up-right -

https://github.com/lgandx/PCredzarrow-up-right

https://github.com/Srinivas11789/PcapXrayarrow-up-right

Red-Team SIEM

https://github.com/outflanknl/RedELKarrow-up-right - Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.

Scanner / Exploitation-Frameworks / Automation

https://github.com/threat9/routersploitarrow-up-right

https://github.com/nccgroup/autopwnarrow-up-right

https://github.com/1N3/Sn1perarrow-up-right

https://github.com/byt3bl33d3r/CrackMapExecarrow-up-right

https://github.com/Cn33liz/p0wnedShellarrow-up-right

https://github.com/archerysec/archerysecarrow-up-right

https://github.com/vulnersCom/nmap-vulnersarrow-up-right

https://github.com/m4ll0k/AutoNSEarrow-up-right - automate nmap with scripting capabilities

https://github.com/v3n0m-Scanner/V3n0M-Scannerarrow-up-right

https://github.com/zdresearch/OWASP-Nettackerarrow-up-right

https://github.com/rvrsh3ll/SharpSMBSprayarrow-up-right - Spray a hash via smb to check for local administrator access

Default Credential Scanner

https://github.com/ztgrace/changemearrow-up-right

https://github.com/InfosecMatter/default-http-login-hunterarrow-up-right - Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.

https://github.com/FortyNorthSecurity/EyeWitnessarrow-up-right

https://github.com/byt3bl33d3r/WitnessMearrow-up-right - screenshot for webservers

https://github.com/ihebski/DefaultCreds-cheat-sheetarrow-up-right - One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password

Default Credential Lookup

https://github.com/Viralmaniar/Passhuntarrow-up-right

Payload Generation / AV-Evasion / Malware Creation

https://github.com/nccgroup/Winpayloadsarrow-up-right

https://github.com/Screetsec/TheFatRatarrow-up-right

https://github.com/xillwillx/tricky.lnkarrow-up-right

https://github.com/trustedsec/unicornarrow-up-right

https://github.com/z0noxz/powerstagerarrow-up-right

https://github.com/curi0usJack/luckystrikearrow-up-right

https://github.com/enigma0x3/Generate-Macroarrow-up-right

https://github.com/Cn33liz/JSMeterarrow-up-right

https://github.com/Mr-Un1k0d3r/MaliciousMacroGeneratorarrow-up-right

https://github.com/Cn33liz/StarFightersarrow-up-right

https://github.com/BorjaMerino/Pazuzuarrow-up-right

https://github.com/mwrlabs/wePWNisearrow-up-right

https://github.com/Mr-Un1k0d3r/UniByAvarrow-up-right

https://github.com/govolution/avetarrow-up-right

https://github.com/Pepitoh/VBadarrow-up-right

https://github.com/mdsecactivebreach/CACTUSTORCHarrow-up-right

https://github.com/D4Vinci/Dr0p1t-Frameworkarrow-up-right

https://github.com/g0tmi1k/msfpcarrow-up-right

https://github.com/bhdresh/CVE-2017-0199arrow-up-right - Office RCE POC

https://github.com/jacob-baines/concealed_positionarrow-up-right - Bring your own print driver privilege escalation tool

https://github.com/GreatSCT/GreatSCTarrow-up-right

https://github.com/mthbernardes/rsgarrow-up-right - reverse shell generator

https://github.com/sevagas/macro_packarrow-up-right

https://github.com/mdsecactivebreach/SharpShooterarrow-up-right

https://github.com/hlldz/SpookFlarearrow-up-right

https://github.com/0xdeadbeefJERKY/Office-DDE-Payloadsarrow-up-right

https://github.com/peewpw/Invoke-PSImagearrow-up-right

https://github.com/Arvanaghi/CheckPleasearrow-up-right - Sandbox Evasion techniques

https://github.com/Aetsu/SLibarrow-up-right - SandBox Evasion in C#

https://github.com/trustedsec/nps_payloadarrow-up-right

https://github.com/stormshadow07/HackTheWorldarrow-up-right

https://github.com/r00t-3xp10it/FakeImageExploiterarrow-up-right

https://github.com/nccgroup/demiguisearrow-up-right - Encrypted HTA Generation

https://github.com/med0x2e/genxlmarrow-up-right

https://github.com/med0x2e/GadgetToJScriptarrow-up-right

https://github.com/rasta-mouse/GadgetToJScriptarrow-up-right - Optimized GadgetToJScript version

https://github.com/EgeBalci/sgnarrow-up-right - Shikata ga nai (δ»•ζ–ΉγŒγͺい) encoder ported into go with several improvements

https://github.com/matterpreter/spotterarrow-up-right - Spotter is a tool to wrap payloads in environmentally-keyed, AES256-encrypted launchers.

https://github.com/s0lst1c3/dropenginearrow-up-right - Malleable payload generation framework.

https://github.com/gigajew/PowerDropperarrow-up-right - Build Powershell Script from .NET Executable

https://github.com/FortyNorthSecurity/EXCELntDonutarrow-up-right - Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.

https://github.com/Greenwolf/ntlm_theftarrow-up-right - A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)

https://github.com/phackt/stager.dllarrow-up-right - AES Encrypt payloads

https://github.com/Arno0x/EmbedInHTMLarrow-up-right - Embed and hide any file in an HTML file

https://github.com/bats3c/darkarmourarrow-up-right - AES Encrypt C/C++ Compiled binaries and decrypt at runtime

https://github.com/christophetd/spoofing-office-macroarrow-up-right - PoC of a VBA macro spawning a process with a spoofed parent and command line.

https://github.com/infosecn1nja/MaliciousMacroMSBuildarrow-up-right - Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.

https://github.com/outflanknl/EvilClippyarrow-up-right - A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.

https://github.com/FortyNorthSecurity/EXCELntDonutarrow-up-right - Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.

https://github.com/STMCyber/boobsnailarrow-up-right - BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.

https://github.com/michaelweber/Macromearrow-up-right - Excel Macro Document Reader/Writer for Red Teamers & Analysts

https://github.com/aaaddress1/xlsKamiarrow-up-right - Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets

https://github.com/CCob/PwnyFormarrow-up-right - PwnyForm will take an MSI installer as input and generate an MSI transform (mst) that can be used to inject arbitrary command execution by adding a custom action that will execute during the UI or Install sequence of an MSI file.

https://github.com/fireeye/OfficePurgearrow-up-right - VBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents. Documents that only contain source code and no compiled code are more likely to evade AV detection and YARA rules.

https://github.com/TestingPens/CPLDropperarrow-up-right - A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just double click them.

https://github.com/FortyNorthSecurity/hot-manchegoarrow-up-right - Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.

https://github.com/knight0x07/ImpulsiveDLLHijackarrow-up-right - C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.

https://github.com/Flangvik/SharpDllProxyarrow-up-right - Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading

https://github.com/jfmaes/Invoke-DLLClonearrow-up-right - Koppeling x Metatwin x LazySign

https://github.com/paranoidninja/CarbonCopyarrow-up-right - Sign an executable for AV-Evasion

https://github.com/Tylous/Limelighterarrow-up-right - A tool for generating fake code signing certificates or signing real ones

https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50arrow-up-right - RCE 0-day for GhostScript 9.50 - Payload generator - ImageMagick

https://github.com/X-C3LL/xlsxPoisonarrow-up-right - Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)

https://github.com/med0x2e/SigFliparrow-up-right - SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.

https://github.com/klezVirus/inceptorarrow-up-right - Template-Driven AV/EDR Evasion Framework

https://github.com/Inf0secRabbit/BadAssMacrosarrow-up-right - BadAssMacros - C# based automated Malicous Macro Generator.

https://github.com/connormcgarr/LittleCorporalarrow-up-right - LittleCorporal: A C# Automated Maldoc Generator

https://github.com/hasherezade/process_ghostingarrow-up-right - Process Ghosting - a PE injection technique, similar to Process DoppelgΓ€nging, but using a delete-pending file instead of a transacted file

https://github.com/optiv/ScareCrowarrow-up-right - ScareCrow - Payload creation framework designed around EDR bypass.

https://github.com/persianhydra/Xeexe-TopAntivirusEvasionarrow-up-right - Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable

Shellcode Injection

https://github.com/TheWover/donutarrow-up-right - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

https://github.com/rasta-mouse/RuralBishoparrow-up-right - D/Invoke port of UrbanBishop

https://github.com/slyd0g/UrbanBishopLocalarrow-up-right - A port of FuzzySecurity's UrbanBishop project for inline shellcode execution

https://github.com/FuzzySecurity/Sharp-Suite/tree/master/UrbanBishoparrow-up-right - Donut for Shellcode Injection

https://github.com/antonioCoco/Mapping-Injectionarrow-up-right - Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx, WriteProcessMemory and CreateRemoteThread.

https://github.com/SolomonSklash/SyscallPOCarrow-up-right - Shellcode injection POC using syscalls.

https://github.com/Arno0x/ShellcodeWrapperarrow-up-right - Shellcode wrapper with encryption for multiple target languages

https://github.com/Ne0nd0g/go-shellcodearrow-up-right - A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.

https://github.com/djhohnstein/CSharpSetThreadContextarrow-up-right - C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread

https://github.com/pwndizzle/c-sharp-memory-injectionarrow-up-right - A set of scripts that demonstrate how to perform memory injection in C#

https://github.com/jthuraisamy/SysWhispers2arrow-up-right - SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls.

https://github.com/mai1zhi2/SysWhispers2_x86arrow-up-right - X86 version of syswhispers2 / x86 direct system call

https://github.com/knownsec/shellcodeloaderarrow-up-right - CreateThreadpoolWait, Fiber Load, NtTestAlert Load, SEH Except Load, TLS CallBack Load, Dynamic Load, Dynamic Load plus, Syscall Load, APC-Inject Load, Early Brid APC-Inject Load, NtCreateSection-Inject Load, OEP Hiijack-Inject Load, Thread Hiijack-Inject Load

https://github.com/djhohnstein/ScatterBrainarrow-up-right - Suite of Shellcode Running Utilities

https://github.com/D00MFist/Go4aRunarrow-up-right - Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process

https://github.com/sh4hin/GoPurplearrow-up-right - Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions

https://github.com/C-Sto/BananaPhonearrow-up-right - It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)

https://github.com/3xpl01tc0d3r/ProcessInjectionarrow-up-right - This program is designed to demonstrate various process injection techniques

https://github.com/plackyhacker/Shellcode-Injection-Techniquesarrow-up-right - A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this project up as I learn, discover or develop more techniques. Some techniques are better than others at bypassing AV.

https://github.com/snovvcrash/DInjectorarrow-up-right - Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL

https://github.com/plackyhacker/Suspended-Thread-Injectionarrow-up-right - Another meterpreter injection technique using C# that attempts to bypass Defender

https://github.com/boku7/Ninja_UUID_Dropperarrow-up-right - Module Stomping, No New Thread, HellsGate syscaller, UUID Dropper for x64 Windows 10!

https://github.com/mobdk/Upsilonarrow-up-right - Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used

https://github.com/0xDivyanshu/Injectorarrow-up-right - Complete Arsenal of Memory injection and other techniques for red-teaming in Windows

https://github.com/JohnWoodman/stealthInjectorarrow-up-right - Injects shellcode into remote processes using direct syscalls

https://github.com/xpn/NautilusProjectarrow-up-right - A collection of weird ways to execute unmanaged code in .NET

https://github.com/xinbailu/DripLoaderarrow-up-right - Evasive shellcode loader for bypassing event-based injection detection (PoC)

https://github.com/cribdragg3r/Alarisarrow-up-right - A protective and Low Level Shellcode Loader that defeats modern EDR systems.

https://github.com/theevilbit/injectionarrow-up-right - C++ Injection techniques

https://github.com/RomanRII/shellcode-through-ICMParrow-up-right - https://blog.romanrii.com/using-icmp-to-deliver-shellcodearrow-up-right

https://github.com/ChaitanyaHaritash/Callback_Shellcode_Injectionarrow-up-right - POCs for Shellcode Injection via Callbacks

https://github.com/ChoiSG/UuidShellcodeExecarrow-up-right - PoC for UUID shellcode execution using DInvoke

https://github.com/S4R1N/AlternativeShellcodeExecarrow-up-right - Alternative Shellcode Execution Via Callbacks

https://github.com/DamonMohammadbagher/NativePayload_CBTarrow-up-right - NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)

https://github.com/S3cur3Th1sSh1t/Nim_CBT_Shellcodearrow-up-right - CallBack-Techniques for Shellcode execution ported to Nim

Loader / Packer / Injectors

https://github.com/med0x2e/ExecuteAssemblyarrow-up-right - Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash)

https://github.com/EgeBalci/amberarrow-up-right - Reflective PE packer.

https://github.com/djhohnstein/ScatterBrainarrow-up-right - Suite of Shellcode Running Utilities

https://github.com/phra/PEzorarrow-up-right - Open-Source PE Packer

https://github.com/dretax/DynamicDllLoaderarrow-up-right - This project describes a technique how a NATIVE dynamic link library (DLL) can be loaded from memory (In C#) without storing it on the hard-disk first.

https://github.com/nettitude/RunPEarrow-up-right - C# Reflective loader for unmanaged binaries.

EDR Evasion - Logging Evasion

https://github.com/CCob/SharpBlockarrow-up-right - A method of bypassing EDR's active projection DLL's by preventing entry point execution

https://github.com/bats3c/Ghost-In-The-Logsarrow-up-right - Evade sysmon and windows event logging

https://github.com/am0nsec/SharpHellsGatearrow-up-right - C# Implementation of the Hell's Gate VX Technique

https://github.com/am0nsec/HellsGatearrow-up-right - Original C Implementation of the Hell's Gate VX Technique

https://github.com/3gstudent/Windows-EventLog-Bypassarrow-up-right - C++ Version of Invoke-Phantom

https://github.com/jfmaes/SharpNukeEventLogarrow-up-right - C# version of Invoke-Phantom

https://github.com/Soledge/BlockEtwarrow-up-right - .Net Assembly to block ETW telemetry in current process

https://github.com/ionescu007/faxhellarrow-up-right - A Bind Shell Using the Fax Service and a DLL Hijack

https://github.com/realoriginal/ppdump-publicarrow-up-right - Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDump() Shellcode

https://github.com/bats3c/EvtMutearrow-up-right - This is a tool that allows you to offensively use YARA to apply a filter to the events being reported by windows event logging.

https://github.com/GetRektBoy724/TripleSarrow-up-right - Extracting Syscall Stub, Modernized

https://github.com/call-042PE/UCantSeeM3arrow-up-right - Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation

https://github.com/bats3c/DarkLoadLibraryarrow-up-right - LoadLibrary for offensive operations

https://github.com/moloch--/DarkLoadLibraryarrow-up-right - Same but with LLVM support

https://github.com/scythe-io/memory-module-loaderarrow-up-right - An implementation of a Windows loader that can load dynamic-linked libraries (DLLs) directly from memory

https://github.com/Yaxser/Backstabarrow-up-right - A tool to kill antimalware protected processes

https://github.com/RedCursorSecurityConsulting/PPLKillerarrow-up-right - Tool to bypass LSA Protection (aka Protected Process Light)

https://github.com/passthehashbrowns/suspendedunhookarrow-up-right - get NTDLL copy from suspended process

https://github.com/LloydLabs/delete-self-pocarrow-up-right - A way to delete a locked file, or current running executable, on disk.

https://github.com/klezVirus/SharpSelfDeletearrow-up-right - C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs

https://github.com/jxy-s/herpaderpingarrow-up-right - Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

https://github.com/bohops/UltimateWDACBypassListarrow-up-right - A centralized resource for previously documented WDAC bypass techniques

https://github.com/mgeeky/ShellcodeFluctuationarrow-up-right - An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

https://github.com/mgeeky/ThreadStackSpooferarrow-up-right - Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.

https://github.com/SolomonSklash/SleepyCryptarrow-up-right - A shellcode function to encrypt a running process image when sleeping.

https://github.com/aaaddress1/PR0CESSarrow-up-right - some gadgets about windows process and ready to use :)

https://github.com/JLospinoso/gargoylearrow-up-right - A memory scanning evasion technique

https://github.com/passthehashbrowns/hiding-your-syscallsarrow-up-right - Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction within NTDLL.

https://github.com/hasherezade/module_overloadingarrow-up-right - A more stealthy variant of "DLL hollowing"

https://github.com/forrest-orr/phantom-dll-hollower-pocarrow-up-right - Phantom DLL hollowing PoC

https://github.com/hasherezade/transacted_hollowingarrow-up-right - Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgΓ€nging

https://github.com/GetRektBoy724/SharpUnhookerarrow-up-right - C# Based Universal API Unhooker

https://github.com/mgeeky/UnhookMearrow-up-right - UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware

https://github.com/aaaddress1/wowInjectorarrow-up-right - PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)

https://github.com/RedSection/OffensivePHarrow-up-right - OffensivePH - use old Process Hacker driver to bypass several user-mode access controls

https://github.com/optiv/Dentarrow-up-right - A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.

https://github.com/Dewera/Plutoarrow-up-right - A manual system call library that supports functions from both ntdll.dll and win32u.dll

https://github.com/jackullrich/universal-syscall-64arrow-up-right - Resolve syscall numbers at runtime for all Windows versions.

https://github.com/br-sn/CheekyBlinderarrow-up-right - Enumerating and removing kernel callbacks using signed vulnerable drivers

https://github.com/jthuraisamy/TelemetrySourcererarrow-up-right - Enumerate and disable common sources of telemetry used by AV/EDR.

https://github.com/TheWover/DInvokearrow-up-right - Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.

https://github.com/fashionproof/CheckSafeBootarrow-up-right - I used this to see if an EDR is running in Safe Mode

https://github.com/asaurusrex/DoppelGatearrow-up-right - DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userland Hooking.

Useful Binary Modification tools

https://github.com/hasherezade/exe_to_dllarrow-up-right

https://github.com/hasherezade/dll_to_exearrow-up-right

https://github.com/hasherezade/pe_to_shellcodearrow-up-right

Android

https://github.com/sensepost/kwetzaarrow-up-right

External Penetration Testing

Domain Finding / Subdomain Enumeration

https://github.com/aboul3la/Sublist3rarrow-up-right

https://github.com/TheRook/subbrutearrow-up-right

https://github.com/michenriksen/aquatonearrow-up-right

https://github.com/darkoperator/dnsreconarrow-up-right

https://github.com/fwaeytens/dnsenumarrow-up-right

https://github.com/s0md3v/Strikerarrow-up-right + Scanner

https://github.com/leebaird/discoverarrow-up-right

https://github.com/eldraco/domain_analyzerarrow-up-right - more like an audit

https://github.com/caffix/amassarrow-up-right - πŸ’—

https://github.com/subfinder/subfinderarrow-up-right

https://github.com/TypeError/domainedarrow-up-right

https://github.com/SilverPoision/Rock-ONarrow-up-right

File Search / Metadata extraction

https://github.com/dafthack/PowerMetaarrow-up-right

https://github.com/ElevenPaths/FOCAarrow-up-right

Scanner

https://github.com/vesche/scanlessarrow-up-right

https://github.com/1N3/Sn1perarrow-up-right

https://github.com/DanMcInerney/pentest-machinearrow-up-right

https://github.com/jaeles-project/jaelesarrow-up-right - The Swiss Army knife for automated Web Application Testing

Email Gathering

https://github.com/leapsecurity/InSpyarrow-up-right

https://github.com/dchrastil/ScrapedInarrow-up-right

https://github.com/SimplySecurity/SimplyEmailarrow-up-right

https://github.com/clr2of8/GatherContactsarrow-up-right

https://github.com/s0md3v/Zenarrow-up-right - Find Emails of Github Users

https://github.com/m8r0wn/CrossLinkedarrow-up-right - super fast emails via google/bing linkedin dorks

https://github.com/m4ll0k/Infogaarrow-up-right

https://github.com/navisecdelta/EmailGenarrow-up-right - A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.

Check Email Accounts

https://github.com/megadose/holehearrow-up-right - allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

Domain Auth + Exploitation

https://github.com/nyxgeek/o365reconarrow-up-right

https://github.com/gremwell/o365enumarrow-up-right - Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.

https://github.com/dafthack/MSOLSprayarrow-up-right - A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.

https://github.com/sachinkamath/NTLMReconarrow-up-right - Tool to enumerate information from NTLM authentication enabled web endpoints

https://github.com/ustayready/fireproxarrow-up-right - rotate IP Adresses over AWS - Combine with MSOLSpray

https://github.com/True-Demon/raindancearrow-up-right - office 365 recon

https://github.com/dafthack/MailSniperarrow-up-right

https://github.com/sensepost/rulerarrow-up-right

https://github.com/Greenwolf/Sprayarrow-up-right - lockout Time integrated

https://github.com/nyxgeek/lyncsmasharrow-up-right - Lync Credential Finder

https://github.com/byt3bl33d3r/SprayingToolkitarrow-up-right - Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient

https://github.com/mdsecresearch/LyncSniperarrow-up-right - Lync Credential Finder

https://github.com/3gstudent/easBrowseSharefilearrow-up-right - Use to browse the share file by eas(Exchange Server ActiveSync)

https://github.com/FSecureLABS/peasarrow-up-right - PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.

https://github.com/snovvcrash/peasarrow-up-right - Modified version of PEAS client for offensive operations - https://snovvcrash.rocks/2020/08/22/tuning-peas-for-fun-and-profit.htmlarrow-up-right

https://github.com/RedLectroid/OutlookSendarrow-up-right - A C# tool to send emails through Outlook from the command line or in memory

https://github.com/nccgroup/Carnivorearrow-up-right - Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb

https://github.com/ricardojoserf/adfsbrutearrow-up-right - A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.

https://github.com/nyxgeek/onedrive_user_enumarrow-up-right - onedrive user enumeration - pentest tool to enumerate valid onedrive users

https://github.com/nyxgeek/AzureAD_Autologon_Brutearrow-up-right - Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/arrow-up-right

https://github.com/treebuilder/aad-sso-enum-brute-sprayarrow-up-right - POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln

https://github.com/SecurityRiskAdvisors/mssprayarrow-up-right - Password attacks and MFA validation against various endpoints in Azure and Office 365

https://github.com/immunIT/TeamsUserEnumarrow-up-right - User enumeration with Microsoft Teams API

https://github.com/knavesec/CredMasterarrow-up-right - Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling

Exchange RCE-exploits

https://github.com/Airboi/CVE-2020-17144-EXParrow-up-right - Exchange2010 authorized RCE

https://github.com/Ridter/cve-2020-0688arrow-up-right - OWA Deserialisation RCE

MobileIron RCE

https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2020-15505arrow-up-right

Specific Service Scanning / Exploitation

Login Brute Force + Wordlist attacks

https://github.com/galkan/crowbararrow-up-right - Brute force non hydra compliant services - RDP, VNC, OpenVPN

https://github.com/1N3/BruteXarrow-up-right - Brute Force various services

https://github.com/x90skysn3k/brutesprayarrow-up-right - 😎

https://github.com/DarkCoderSc/win-brute-logonarrow-up-right - Crack any Microsoft Windows users password without any privilege (Guest account included)

https://github.com/lanjelot/patatorarrow-up-right

https://github.com/dafthack/RDPSprayarrow-up-right - RDP Password Spray - No Event Logs

https://github.com/xFreed0m/RDPassSprayarrow-up-right - Python3 tool to perform password spraying using RDP

SNMP

https://github.com/hatlord/snmpwnarrow-up-right

Open X11

https://github.com/sensepost/xrdparrow-up-right

Printers

https://github.com/RUB-NDS/PRETarrow-up-right

https://github.com/BusesCanFly/PRETtyarrow-up-right - Automation for PRET

MSSQL

https://github.com/quentinhardy/msdatarrow-up-right

Oracle

https://github.com/quentinhardy/odatarrow-up-right

IKE

https://github.com/SpiderLabs/ikeforcearrow-up-right

SMB Null Session Exploitation

https://github.com/m8r0wn/nullinuxarrow-up-right

iLO Exploitation

https://github.com/airbus-seclab/ilo4_toolboxarrow-up-right https://www.exploit-db.com/exploits/44005arrow-up-right

vmware vCenter Exploits

https://github.com/guardicore/vmware_vcenter_cve_2020_3952arrow-up-right - Exploit for CVE-2020-3952 in vCenter 6.7

Intel AMT Exploitation

https://github.com/Coalfire-Research/DeathMetalarrow-up-right

SAP Exploitation

https://github.com/comaeio/OPCDEarrow-up-right

https://github.com/gelim/sap_msarrow-up-right

https://github.com/chipik/SAP_GW_RCE_exploitarrow-up-right

FPM port

Found Port 9001 open? Try that:

https://github.com/hannob/fpmvulnarrow-up-right - bash poc scripts to exploit open fpm ports

Weblogic Exploitation

https://github.com/0xn0ne/weblogicScannerarrow-up-right - scan/test for nearly all weblogic vulns

https://github.com/quentinhardy/jndiatarrow-up-right - WEblogic Server Tests

https://github.com/kingkaki/weblogic-scanarrow-up-right

https://github.com/FlyfishSec/weblogic_rcearrow-up-right - cve-2019-2725

https://github.com/SukaraLin/CVE-2019-2890arrow-up-right

https://github.com/1337g/CVE-2017-10271arrow-up-right

https://github.com/LandGrey/CVE-2018-2894arrow-up-right

https://github.com/Y4er/CVE-2020-2551arrow-up-right

Sharepoint exploitation

https://github.com/sensepost/SPartanarrow-up-right - Sharepoint Fingerprint + Exploitation

https://github.com/Voulnet/desharializearrow-up-right

JIRA

https://github.com/0x48piraj/Jiraffearrow-up-right - One stop place for exploiting Jira instances in your proximity

Sonicwall VPN

https://github.com/darrenmartyn/VisualDoorarrow-up-right

VSphere VCenter

https://github.com/JamesCooteUK/SharpSpherearrow-up-right - .NET Project for Attacking vCenter

Dameware

https://github.com/warferik/CVE-2019-3980arrow-up-right

Confluence Exploit

https://github.com/h3v0x/CVE-2021-26084_Confluencearrow-up-right - Confluence Server Webwork OGNL injection

Telerik UI for ASP.NET AJAX Exploit

https://github.com/noperator/CVE-2019-18935arrow-up-right

General Recon

https://github.com/FortyNorthSecurity/EyeWitnessarrow-up-right

Solarwinds

https://github.com/mubix/solarflarearrow-up-right - SolarWinds Orion Account Audit / Password Dumping Utility

Command & Control Frameworks

https://github.com/n1nj4sec/pupyarrow-up-right

https://github.com/nettitude/PoshC2arrow-up-right

https://github.com/FortyNorthSecurity/WMImplantarrow-up-right

https://github.com/quasar/QuasarRATarrow-up-right

https://github.com/EmpireProject/Empirearrow-up-right

https://github.com/zerosum0x0/koadicarrow-up-right

https://github.com/Mr-Un1k0d3r/ThunderShellarrow-up-right

https://github.com/Ne0nd0g/merlinarrow-up-right

https://github.com/Arno0x/WebDavC2arrow-up-right

https://github.com/malwaredllc/byobarrow-up-right

https://github.com/byt3bl33d3r/SILENTTRINITYarrow-up-right

https://github.com/SharpC2/SharpC2arrow-up-right - Command and Control Framework written in C#.

https://github.com/Arno0x/WSC2arrow-up-right

https://github.com/BC-SECURITY/Empirearrow-up-right - Empire with embedded AMSI-Bypass

https://github.com/cobbr/Covenantarrow-up-right

https://github.com/cobbr/C2Bridgearrow-up-right - C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.

https://github.com/py7hagoras/CovenantTasksarrow-up-right - Source for tasks I have used with Covenant

https://github.com/BishopFox/sliverarrow-up-right - Implant framework

https://github.com/bats3c/shad0warrow-up-right - A post exploitation framework designed to operate covertly on heavily monitored environments

https://github.com/FSecureLABS/C3arrow-up-right - Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.

https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharparrow-up-right - Open-Source Remote Administration Tool For Windows C# (RAT)

https://github.com/its-a-feature/Mythicarrow-up-right

https://github.com/Cr4sh/MicroBackdoorarrow-up-right - Small and convenient C2 tool for Windows targets

https://github.com/cyberark/kubesploitarrow-up-right - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

Mythic Agents

https://github.com/MythicAgents/Apolloarrow-up-right

https://github.com/MythicAgents/Nimplantarrow-up-right

VBA

https://github.com/JohnWoodman/VBA-Macro-Projectsarrow-up-right - This repository is a collection of my malicious VBA projects.

https://github.com/karttoon/trigenarrow-up-right - Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.

https://github.com/rmdavy/HeapsOfFunarrow-up-right - AMSI Bypass Via the Heap

https://github.com/S3cur3Th1sSh1t/OffensiveVBAarrow-up-right - This repo covers some code execution and AV Evasion methods for Macros in Office documents

Rust

https://github.com/Kudaes/DInvoke_rsarrow-up-right - Dynamically invoke arbitrary unmanaged code.

https://github.com/trickster0/OffensiveRustarrow-up-right - Rust Weaponization for Red Team Engagements.

Go

https://github.com/malware-unicorn/GoPEInjectionarrow-up-right - Golang PE injection on windows

Cobalt Strike Stuff

https://github.com/DeEpinGh0st/Erebusarrow-up-right

https://github.com/aleenzz/Cobalt_Strike_wikiarrow-up-right

https://github.com/FortyNorthSecurity/C2concealerarrow-up-right

https://github.com/invokethreatguy/AggressorCollectionarrow-up-right

https://github.com/harleyQu1nn/AggressorScriptsarrow-up-right

https://github.com/mgeeky/cobalt-arsenalarrow-up-right - My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+

https://github.com/xforcered/CredBanditarrow-up-right - Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel

https://github.com/EncodeGroup/BOF-RegSavearrow-up-right - Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File

https://github.com/EncodeGroup/AggressiveGadgetToJScriptarrow-up-right - A Cobalt Strike Aggressor script to generate GadgetToJScript payloads

https://github.com/rvrsh3ll/BOF_Collectionarrow-up-right - Various Cobalt Strike BOFs

https://github.com/EspressoCake/HandleKatz_BOFarrow-up-right - A BOF port of the research of @thefLinkk and @codewhitesec

https://github.com/trustedsec/CS-Situational-Awareness-BOFarrow-up-right - Situational Awareness commands implemented using Beacon Object Files

https://github.com/anthemtotheego/InlineExecute-Assemblyarrow-up-right - InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module

https://github.com/EspressoCake/Self_Deletion_BOFarrow-up-right - BOF implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs

https://github.com/EspressoCake/PPLDump_BOFarrow-up-right - A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.

https://github.com/boku7/CobaltStrikeReflectiveLoaderarrow-up-right - Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.

https://github.com/optiv/Registry-Reconarrow-up-right - Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon

https://github.com/Tylous/SourcePointarrow-up-right - SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.

https://github.com/boku7/spawnarrow-up-right - Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.

https://github.com/OG-Sadpanda/SharpExceliburarrow-up-right - Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly

https://github.com/OG-Sadpanda/SharpSwordarrow-up-right - Read the contents of DOCX files using Cobalt Strike's Execute-Assembly

https://github.com/EncodeGroup/AggressiveProxyarrow-up-right - Project to enumerate proxy configurations and generate shellcode from CobaltStrike

https://github.com/mgeeky/RedWardenarrow-up-right - Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

https://github.com/rsmudge/unhook-bofarrow-up-right - Remove API hooks from a Beacon process.

https://github.com/ajpc500/BOFsarrow-up-right - Collection of Beacon Object Files

https://github.com/outflanknl/InlineWhispersarrow-up-right - Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)

Android

https://github.com/AhMyth/AhMyth-Android-RATarrow-up-right

Linux MacOSX Specific

https://github.com/neoneggplant/EggShellarrow-up-right

Wifi Tools

https://github.com/wifiphisher/wifiphisherarrow-up-right

https://github.com/P0cL4bs/WiFi-Pumpkinarrow-up-right

https://github.com/s0lst1c3/eaphammerarrow-up-right

https://github.com/h0nus/RogueSploitarrow-up-right

https://github.com/Tylous/SniffAirarrow-up-right

https://github.com/FluxionNetwork/fluxionarrow-up-right

https://github.com/derv82/wifite2arrow-up-right

https://github.com/ICSec/airpwn-ngarrow-up-right

https://github.com/xdavidhu/mitmAParrow-up-right

https://github.com/ZerBea/hcxdumptoolarrow-up-right

https://github.com/P0cL4bs/wifipumpkin3arrow-up-right - Powerful framework for rogue access point attack.

Android / Nethunter

https://github.com/faizann24/wifi-bruteforcer-fsecurifyarrow-up-right

https://github.com/chrisk44/Hijackerarrow-up-right

NAT Slipstreaming

https://github.com/samyk/slipstreamarrow-up-right - NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website

Raspberri PI Exploitation

https://github.com/secgroundzero/warberryarrow-up-right

https://github.com/samyk/poisontaparrow-up-right

https://github.com/mame82/P4wnP1arrow-up-right

https://github.com/mame82/P4wnP1_aloaarrow-up-right

https://github.com/pi-hole/pi-holearrow-up-right

Physical Security / HID/ETH Emulator

https://github.com/carmaa/inceptionarrow-up-right - PCI-based DMA

https://github.com/samratashok/Kautilyaarrow-up-right

https://github.com/ufrisk/pcileecharrow-up-right - PCI based DMA

https://github.com/Screetsec/Brutalarrow-up-right - Teensy Payloads

https://github.com/insecurityofthings/jackitarrow-up-right

https://github.com/BastilleResearch/mousejackarrow-up-right

Social Engeneering

https://github.com/kgretzky/evilginxarrow-up-right

https://github.com/threatexpress/domainhunterarrow-up-right

https://github.com/netevert/dnsmorpharrow-up-right - lookup valid phishing-Domains

https://github.com/elceef/dnstwistarrow-up-right - lookup valid phishing-Domains

https://github.com/quickbreach/SMBetrayarrow-up-right - Change SMB Files on the fly

https://github.com/SteveLTN/https-portalarrow-up-right

https://github.com/ryhanson/phisheryarrow-up-right

https://github.com/curtbraz/Phishing-APIarrow-up-right - Comprehensive Web Based Phishing Suite of Tools for Rapid Deployment and Real-Time Alerting!

Defender Guides / Tools / Incident Response / Blue Team

https://github.com/CCob/BeaconEyearrow-up-right - Hunts out CobaltStrike beacons and logs operator command output

https://github.com/3lp4tr0n/BeaconHunterarrow-up-right - Detect and respond to Cobalt Strike beacons using ETW.

https://github.com/IonizeCbr/AmsiPatchDetectionarrow-up-right - Detect AMSI.dll in memory patch

https://github.com/cisagov/Sparrowarrow-up-right - Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.

https://github.com/meirwah/awesome-incident-responsearrow-up-right

https://github.com/CredDefense/CredDefensearrow-up-right - Credential and Red Teaming Defense for Windows Environments

https://github.com/PaulSec/awesome-windows-domain-hardeningarrow-up-right

https://github.com/ernw/hardeningarrow-up-right

https://github.com/Invoke-IR/Uprootarrow-up-right

https://github.com/danielbohannon/Revoke-Obfuscationarrow-up-right - powershell obfuscation detection

https://github.com/NotPrab/.NET-Deobfuscatorarrow-up-right - Lists of .NET Deobfuscator and Unpacker (Open Source)

https://github.com/countercept/python-exe-unpackerarrow-up-right - python exe decompile

https://github.com/0xd4d/de4dotarrow-up-right - .NET Revoke-Obfuscation

https://github.com/securitywithoutborders/hardentoolsarrow-up-right

https://github.com/x0rz/phishing_catcherarrow-up-right

https://github.com/Ben0xA/PowerShellDefensearrow-up-right

https://github.com/emposha/PHP-Shell-Detectorarrow-up-right

https://github.com/LordNoteworthy/al-khaserarrow-up-right

https://github.com/Security-Onion-Solutions/security-onionarrow-up-right - ids

https://github.com/ptresearch/AttackDetectionarrow-up-right

https://github.com/MHaggis/hunt-detect-preventarrow-up-right

https://github.com/JPCERTCC/LogonTracerarrow-up-right - Investigate malicious Windows logon by visualizing and analyzing Windows event log

https://github.com/lithnet/ad-password-protectionarrow-up-right - AD Passwort Blacklisting

https://github.com/R3MRUM/PSDecodearrow-up-right - Powershell DE-Obfuscation

https://github.com/denisugarte/PowerDrivearrow-up-right - A tool for de-obfuscating PowerShell scripts

https://github.com/matterpreter/DefenderCheckarrow-up-right - Identifies the bytes that Microsoft Defender flags on.

https://github.com/rasta-mouse/ThreatCheckarrow-up-right - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.

https://github.com/hegusung/AVSignSeekarrow-up-right - Tool written in python3 to determine where the AV signature is located in a binary/payload

https://github.com/sbousseaden/EVTX-ATTACK-SAMPLESarrow-up-right

https://github.com/ION28/BLUESPAWNarrow-up-right - An Active Defense and EDR software to empower Blue Teams

https://github.com/hasherezade/hollows_hunterarrow-up-right - Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

https://github.com/hasherezade/pe-sievearrow-up-right - Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

https://github.com/0Kee-Team/WatchADarrow-up-right - AD Security Intrusion Detection System

https://github.com/nsacyber/Mitigating-Web-Shellsarrow-up-right

https://github.com/redcanaryco/atomic-red-teamarrow-up-right - Small and highly portable detection tests based on MITRE's ATT&CK.

https://github.com/DamonMohammadbagher/ETWProcessMon2arrow-up-right - ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.

https://github.com/p0dalirius/LDAPmonitorarrow-up-right - Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

https://github.com/PSGumshoe/PSGumshoearrow-up-right - PSGumshoe is a Windows PowerShell module for the collection of OS and domain artifacts for the purposes of performing live response, hunt, and forensics.

https://github.com/rajiv2790/FalconEyearrow-up-right - FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch process injections as they are happening (real-time). Since FalconEye runs in kernel mode, it provides a stronger and reliable defense against process injection techniques that try to evade various user-mode hooks.

Wordlists / Wordlist generators

https://github.com/danielmiessler/SecListsarrow-up-right

https://github.com/berzerk0/Probable-Wordlistsarrow-up-right

https://github.com/govolution/betterdefaultpasslistarrow-up-right

https://github.com/insidetrust/statistically-likely-usernamesarrow-up-right

https://github.com/LandGrey/pydictorarrow-up-right

https://github.com/sc0tfree/mentalistarrow-up-right

https://github.com/skahwah/wordsmitharrow-up-right

https://github.com/1N3/IntruderPayloadsarrow-up-right

https://github.com/fuzzdb-project/fuzzdbarrow-up-right

https://github.com/Bo0oM/fuzz.txtarrow-up-right

https://github.com/laconicwolf/Password-Scriptsarrow-up-right

https://github.com/FlameOfIgnis/Pwdb-Publicarrow-up-right - A collection of all the data i could extract from 1 billion leaked credentials from internet.

AD Lab Environment

https://github.com/davidprowe/BadBloodarrow-up-right

https://github.com/WazeHell/vulnerable-ADarrow-up-right - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab

https://github.com/clong/DetectionLabarrow-up-right - Automate the creation of a lab environment complete with security tooling and logging best practices

Obfuscation

https://github.com/xoreaxeaxeax/movfuscatorarrow-up-right

https://github.com/danielbohannon/Invoke-DOSfuscationarrow-up-right

https://github.com/unixpickle/gobfuscatearrow-up-right - GO Obfuscator

https://github.com/NotPrab/.NET-Obfuscatorarrow-up-right - Lists of .NET Obfuscator (Free, Trial, Paid and Open Source )

https://github.com/javascript-obfuscator/javascript-obfuscatorarrow-up-right - Javascript Obfuscator

https://github.com/danielbohannon/Invoke-Obfuscationarrow-up-right - Powershell Obfuscator

https://github.com/BinaryScary/NET-Obfuscatearrow-up-right - .NET IL Obfuscator

https://github.com/scrt/avcleanerarrow-up-right - C/C++ source obfuscator for antivirus bypass

https://github.com/meme/hellscapearrow-up-right - GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.

https://github.com/mgeeky/VisualBasicObfuscatorarrow-up-right - VBS Obfuscator

https://github.com/3xpl01tc0d3r/Obfuscatorarrow-up-right - Shellcode Obfuscator

https://github.com/EgeBalci/sgnarrow-up-right - Shellcode Encoder

https://github.com/burrowers/garblearrow-up-right - Obfuscate Go builds

https://github.com/JustasMasiulis/xorstrarrow-up-right - heavily vectorized c++17 compile time string encryption.

https://github.com/AnErrupTion/LoGiC.NETarrow-up-right - A more advanced free and open .NET obfuscator using dnlib.

https://github.com/klezVirus/chameleonarrow-up-right - PowerShell Script Obfuscator

https://github.com/xforcered/InvisibilityCloakarrow-up-right - Proof-of-concept obfuscation toolkit for C# post-exploitation tools

https://github.com/Flangvik/RosFuscatorarrow-up-right - YouTube/Livestream project for obfuscating C# source code using Roslyn

https://github.com/JoelGMSec/Invoke-Stealtharrow-up-right - Simple & Powerful PowerShell Script Obfuscator

https://github.com/GetRektBoy724/BetterXencryptarrow-up-right - A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.

https://github.com/obfuscator-llvm/obfuscatorarrow-up-right - C obfuscator

https://github.com/moloch--/denimarrow-up-right - NIM llvm obfuscator

Hash Crack / Decryption

https://hashcat.net/hashcat/arrow-up-right

https://github.com/Ciphey/Cipheyarrow-up-right - Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back.

https://github.com/Coalfire-Research/npkarrow-up-right - A mostly-serverless distributed hash cracking platform

https://github.com/JoelGMSec/Cloudtopolisarrow-up-right - Cracking hashes in the Cloud (for free!)

https://github.com/f0cker/crackqarrow-up-right - CrackQ: A Python Hashcat cracking queue system

Source Code / Binary Analysis

Binary Analysis

https://github.com/avast/retdecarrow-up-right

https://github.com/MobSF/Mobile-Security-Framework-MobSFarrow-up-right

Source Code Analysis

https://github.com/mre/awesome-static-analysisarrow-up-right

https://github.com/eslint/eslintarrow-up-right - Javascript

https://github.com/dpnishant/jsprimearrow-up-right - Javascript

https://github.com/phpstan/phpstanarrow-up-right - PHP

https://github.com/ecriminal/phpvulnarrow-up-right - Audit tool to find common vulnerabilities in PHP source code

Nim

https://github.com/snovvcrash/NimHollowarrow-up-right - Nim implementation of Process Hollowing using syscalls (PoC)

https://github.com/jonaslejon/malicious-pdfarrow-up-right - Malicious PDF Generator

https://github.com/byt3bl33d3r/OffensiveNimarrow-up-right

https://github.com/Yardanico/nim-strencarrow-up-right - A tiny library to automatically encrypt string literals in Nim code

https://github.com/ChaitanyaHaritash/NIM-Scriptsarrow-up-right

https://github.com/Moriarty2016/NimRDIarrow-up-right - RDI implementation in Nim

https://github.com/ajpc500/NimExamplesarrow-up-right - A collection of offensive Nim example code

https://github.com/elddy/Nim-SMBExecarrow-up-right - SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique

https://github.com/FedericoCeratto/nim-socks5arrow-up-right - Nim Socks5 library

MISC

https://github.com/rvrsh3ll/TokenTacticsarrow-up-right - Azure JWT Token Manipulation Toolset

https://github.com/zer1t0/ticket_converterarrow-up-right - A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.

https://github.com/pentestmonkey/gateway-finderarrow-up-right

https://github.com/Cybellum/DoubleAgentarrow-up-right

https://github.com/ytisf/theZooarrow-up-right

https://github.com/kbandla/APTnotesarrow-up-right

https://github.com/WindowsLies/BlockWindowsarrow-up-right

https://github.com/secrary/InjectProcarrow-up-right

https://github.com/AlsidOfficial/WSUSpenduarrow-up-right

https://github.com/SigPloiter/SigPloitarrow-up-right

https://github.com/virajkulkarni14/WebDeveloperSecurityChecklistarrow-up-right

https://github.com/PowerShell/PowerShellarrow-up-right

https://github.com/landhb/HideProcessarrow-up-right

https://github.com/meliht/Mr.SIParrow-up-right

https://github.com/XiphosResearch/exploitsarrow-up-right

https://github.com/jas502n/CVE-2019-13272arrow-up-right

https://github.com/fox-it/cve-2019-1040-scannerarrow-up-right

https://github.com/worawit/MS17-010arrow-up-right

https://github.com/DiabloHorn/yara4pentestersarrow-up-right

https://github.com/D4Vinci/Cr3dOv3rarrow-up-right

https://github.com/a2u/CVE-2018-7600arrow-up-right - Drupal Exploit

https://github.com/joxeankoret/CVE-2017-7494arrow-up-right - SAMBA Exploit

https://github.com/D4Vinci/One-Lin3rarrow-up-right - Reverse Shell Oneliner / Payload Generation

https://github.com/0x00-0x00/ShellPoparrow-up-right - Reverse/Bind Shell Generator

https://github.com/Acceis/crypto_identifierarrow-up-right

https://github.com/sensepost/UserEnumarrow-up-right - check if a user is valid in a domain

https://github.com/LOLBAS-Project/LOLBASarrow-up-right - Living of the Land Binaries

https://github.com/peewpw/Invoke-BSODarrow-up-right - Windows Denial of Service Exploit

https://github.com/mtivadar/windows10_ntfs_crash_dosarrow-up-right - Windows Denial of Service Exploit

https://github.com/deepzec/Bad-Pdfarrow-up-right PDF Steal NTLMv2 Hash Exploit - CVE-2018-4993

https://github.com/SecureAuthCorp/impacketarrow-up-right - πŸ’₯ πŸ”₯ πŸ’₯

https://github.com/blacknbunny/libSSH-Authentication-Bypassarrow-up-right - LibSSH Authentication Bypass vuln.

https://github.com/OneLogicalMyth/zeroday-powershellarrow-up-right - windows Privesc Exploit

https://github.com/smicallef/spiderfootarrow-up-right - OSINT

https://github.com/ShawnDEvans/smbmaparrow-up-right

https://github.com/Coalfire-Research/java-deserialization-exploitsarrow-up-right - Deserialisation Exploits

https://github.com/RhinoSecurityLabs/GCPBucketBrutearrow-up-right - S3 bucket tester

https://github.com/khast3x/h8mailarrow-up-right

https://github.com/dirkjanm/adidnsdumparrow-up-right - Zone transfer like for internal assessment

https://github.com/gquere/pwn_jenkinsarrow-up-right

https://github.com/JavelinNetworks/IR-Toolsarrow-up-right - Get-ShellContent.ps1 get the typed content for all open shells

https://github.com/taviso/ctftoolarrow-up-right - windows CTF Exploitation

https://github.com/jedisct1/dsvpnarrow-up-right

https://github.com/GoSecure/dtd-finderarrow-up-right

https://github.com/tyranid/DotNetToJScriptarrow-up-right

https://github.com/cfreal/exploitsarrow-up-right - Apache Privilege Escalation

https://github.com/Al1ex/WindowsElevationarrow-up-right - Windows Elevation(ζŒη»­ζ›΄ζ–°)

https://github.com/adamdriscoll/snekarrow-up-right - Execute python from powershell

https://github.com/g0tmi1k/exe2hexarrow-up-right

https://github.com/beurtschipper/Depixarrow-up-right - Recovers passwords from pixelized screenshots

https://github.com/slaeryan/AQUARMOURYarrow-up-right - This is a tool suite consisting of miscellaneous offensive tooling aimed at red teamers/penetration testers to primarily aid in Defense Evasion TA0005

https://github.com/mmozeiko/aes-finderarrow-up-right - Utility to find AES keys in running processes

https://github.com/Flangvik/SharpCollectionarrow-up-right - Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.

https://github.com/CCob/MinHook.NETarrow-up-right - A C# port of the MinHook API hooking library

https://github.com/Mr-Un1k0d3r/EDRsarrow-up-right - This repo contains information about EDRs that can be useful during red team exercise.

Big-IP Exploitation

https://github.com/jas502n/CVE-2020-5902arrow-up-right

Azure Cloud Tools

https://github.com/hausec/PowerZurearrow-up-right

https://github.com/NetSPI/MicroBurstarrow-up-right

https://github.com/dirkjanm/ROADtoolsarrow-up-right - The Azure AD exploration framework.

https://github.com/dafthack/CloudPentestCheatsheetsarrow-up-right

https://github.com/cyberark/BlobHunterarrow-up-right - Find exposed data in Azure with this public blob scanner

Anonymous / Tor Projects

https://github.com/realgam3/pymultitorarrow-up-right

https://github.com/Und3rf10w/kali-anonsurfarrow-up-right

https://github.com/GouveaHeitor/nipearrow-up-right

https://github.com/cryptolok/GhostInTheNetarrow-up-right

https://github.com/DanMcInerney/elite-proxy-finderarrow-up-right

https://github.com/vulnersCom/getsploitarrow-up-right

https://github.com/1N3/Findsploitarrow-up-right

Industrial Control Systems

https://github.com/dark-lbp/isfarrow-up-right

https://github.com/klsecservices/s7scanarrow-up-right

https://github.com/w3h/isfarrow-up-right

https://github.com/atimorin/scada-toolsarrow-up-right -

Network access control bypass

https://github.com/scipag/nac_bypassarrow-up-right

Jenkins

https://github.com/cedowens/Jenkins_Hunter_CSharparrow-up-right

https://github.com/petercunha/jenkins-rcearrow-up-right

https://github.com/gquere/pwn_jenkinsarrow-up-right

https://medium.com/@adamyordan/a-case-study-on-jenkins-rce-c2558654f2cearrow-up-right

https://github.com/Accenture/jenkins-attack-frameworkarrow-up-right

JMX Exploitation

https://github.com/mogwailabs/mjetarrow-up-right

https://github.com/siberas/sjetarrow-up-right

https://github.com/qtc-de/beanshooterarrow-up-right - JMX enumeration and attacking tool.

https://github.com/mogwaisec/mjetarrow-up-right - Mogwai Java Management Extensions (JMX) Exploitation Toolkit

Citrix Netscaler Pwn

https://github.com/trustedsec/cve-2019-19781arrow-up-right

mikrotik pwn

https://github.com/vulnersCom/mikrot8overarrow-up-right - Fast exploitation tool for Mikrotik RouterOS up to 6.38.4

Red Team infrastructure setup

https://github.com/obscuritylabs/RAIarrow-up-right

https://github.com/Coalfire-Research/Red-Baronarrow-up-right - terraform cloud c2 redirector setup

https://github.com/qsecure-labs/overlordarrow-up-right - Red Teaming Infrastructure Automation based on Red-Baron

https://github.com/rmikehodges/hideNsneakarrow-up-right - This application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various cloud services. These include VMs, domain fronting, Cobalt Strike servers, API gateways, and firewalls.

https://github.com/shr3ddersec/Shr3dKitarrow-up-right

https://github.com/t94j0/satellitearrow-up-right

https://github.com/Cerbersec/DomainBorrowingC2arrow-up-right - Domain Borrowing is a new method to hide C2 traffic using CDN. It was first presented at Blackhat Asia 2021 by Junyu Zhou and Tianze Ding.

https://github.com/Dliv3/DomainBorrowingarrow-up-right - Domain Borrowing PoC

Bypass SPF/DKIM/DMARC

https://github.com/chenjj/espooferarrow-up-right

Redis Exploitation

https://github.com/n0b0dyCN/redis-rogue-serverarrow-up-right

https://github.com/Ridter/redis-rcearrow-up-right

MSF:

  • scanner/redis/file_upload

  • exploit/linux/redis/redis_replication_cmd_exec

Windows Targets - Webshell upload

Apache Tomcat Exploitation

https://github.com/mgeeky/tomcatWarDeployerarrow-up-right - Apache Tomcat auto WAR deployment & pwning penetration testing tool.

https://github.com/00theway/Ghostcat-CNVD-2020-10487arrow-up-right - AJP Exploit CVE-2020-1938

https://github.com/Ridter/redis-rcearrow-up-right

SSRF Exploitation

https://github.com/swisskyrepo/SSRFmaparrow-up-right

LFI exploitation

https://github.com/mzfr/liffyarrow-up-right

MondoDB Redis Couchdb Exploitation

https://github.com/torque59/Nosql-Exploitation-Frameworkarrow-up-right

https://github.com/Charlie-belmer/nosqliarrow-up-right - NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.

XXE

https://github.com/luisfontes19/xxexploiterarrow-up-right

Elasticsearch / Kibana Exploitation

https://github.com/0xbug/Biu-frameworkarrow-up-right

RMI attacks

https://github.com/NickstaDB/BaRMIearrow-up-right

https://github.com/BishopFox/rmiscoutarrow-up-right - RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities

JSON Web Token Analysis / Exploitation

https://github.com/ticarpi/jwt_toolarrow-up-right

Docker Exploitation

https://github.com/AbsoZed/DockerPwn.pyarrow-up-right - automation of Docker TCP socket abuse

https://raw.githubusercontent.com/swisskyrepo/PayloadsAllTheThings/master/CVE%20Exploits/Docker%20API%20RCE.pyarrow-up-right - Docker API exposed RCE

PHP exploits

https://github.com/neex/phuip-fpizdamarrow-up-right - nginx + php misconfiguration

Cloud attack tools

https://github.com/mdsecactivebreach/o365-attack-toolkitarrow-up-right

Bluetooth / low energy

https://github.com/ojasookert/CVE-2017-0785arrow-up-right

https://github.com/evilsocket/bleaharrow-up-right

https://github.com/virtualabs/btlejackarrow-up-right

Wireless / Radio Exploitation

https://github.com/mame82/LOGITackerarrow-up-right

APT / Malware Emulation / Defense Check

https://github.com/TryCatchHCF/DumpsterFirearrow-up-right

https://github.com/NextronSystems/APTSimulatorarrow-up-right

https://github.com/redhuntlabs/RedHunt-OSarrow-up-right

https://github.com/guardicore/monkeyarrow-up-right

Hash Crack / Lookup

https://github.com/k4m4/dcipher-cliarrow-up-right

https://github.com/s0md3v/Hash-Busterarrow-up-right

https://github.com/initstring/passphrase-wordlistarrow-up-right

OSCP Lists / tools / help

https://github.com/sailay1996/expl-binarrow-up-right

https://github.com/CyDefUnicorn/OSCP-Archivesarrow-up-right

ASPX Webshells

https://github.com/antonioCoco/SharPyShellarrow-up-right

PHP Webshells

https://github.com/flozz/p0wny-shellarrow-up-right

https://github.com/nil0x42/phpsploitarrow-up-right - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner

https://github.com/gellin/bantamarrow-up-right - A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.

JSP WebShells

https://github.com/SecurityRiskAdvisors/cmd.jsparrow-up-right

Other Tool-Lists / Cheat Sheets

https://github.com/D3VI5H4/Antivirus-Artifactsarrow-up-right - List of Hooking DLLs for different AV vendors

https://github.com/PwnDexter/SharpEDRCheckerarrow-up-right - Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.

https://github.com/Hack-with-Github/Awesome-Hackingarrow-up-right

https://github.com/enaqx/awesome-pentestarrow-up-right

https://github.com/HarmJ0y/CheatSheetsarrow-up-right

https://github.com/zhzyker/exphubarrow-up-right

https://github.com/vysecurity/RedTipsarrow-up-right

https://github.com/toolswatch/blackhat-arsenal-toolsarrow-up-right

https://github.com/jivoi/awesome-osintarrow-up-right

https://github.com/qazbnm456/awesome-cve-pocarrow-up-right

https://github.com/swisskyrepo/PayloadsAllTheThingsarrow-up-right

https://github.com/dsasmblr/hacking-online-gamesarrow-up-right

https://github.com/carpedm20/awesome-hackingarrow-up-right

https://github.com/rshipp/awesome-malware-analysisarrow-up-right

https://github.com/thibmaek/awesome-raspberry-piarrow-up-right

https://github.com/bigb0sss/RedTeam-OffensiveSecurityarrow-up-right

https://github.com/vitalysim/Awesome-Hacking-Resourcesarrow-up-right

https://github.com/mre/awesome-static-analysisarrow-up-right

https://github.com/coreb1t/awesome-pentest-cheat-sheetsarrow-up-right

https://github.com/infosecn1nja/Red-Teaming-Toolkitarrow-up-right

https://github.com/rmusser01/Infosec_Referencearrow-up-right

https://github.com/trimstray/the-book-of-secret-knowledgearrow-up-right

https://github.com/N7WEra/SharpAllTheThingsarrow-up-right

https://github.com/3gstudent/Pentest-and-Development-Tipsarrow-up-right

https://github.com/qazbnm456/awesome-web-securityarrow-up-right

https://github.com/chryzsh/awesome-windows-securityarrow-up-right

https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEarrow-up-right

https://github.com/We5ter/Scanners-Boxarrow-up-right

https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheetarrow-up-right

https://github.com/smgorelik/Windows-RCE-exploitsarrow-up-right

https://github.com/trustedsec/physical-docsarrow-up-right

https://github.com/matterpreter/OffensiveCSharparrow-up-right

https://github.com/mgeeky/Penetration-Testing-Toolsarrow-up-right

https://github.com/nomi-sec/PoC-in-GitHubarrow-up-right

https://github.com/mantvydasb/RedTeam-Tactics-and-Techniquesarrow-up-right

https://github.com/netbiosX/Checklistsarrow-up-right

https://github.com/Mr-Un1k0d3r/RedTeamCSharpScriptsarrow-up-right

https://github.com/adon90/pentest_compilationarrow-up-right

https://github.com/sailay1996/awesome_windows_logical_bugsarrow-up-right

https://github.com/EnableSecurity/awesome-rtc-hackingarrow-up-right

https://github.com/api0cradle/UltimateAppLockerByPassListarrow-up-right

https://github.com/hahwul/WebHackersWeaponsarrow-up-right

https://github.com/d0nkeys/redteamarrow-up-right

https://github.com/d1pakda5/PowerShell-for-Pentestersarrow-up-right

https://github.com/Mr-Un1k0d3r/RedTeamCSharpScriptsarrow-up-right

https://github.com/google/tsunami-security-scannerarrow-up-right

Last updated