tnpitsecurity/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Language: Go
#golang #pentesting #post_exploitation #offensive_security #tunneling #pivoting #pentest_tool #redteam
Stars: 92 Issues: 1 Forks: 5
https://github.com/tnpitsecurity/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Language: Go
#golang #pentesting #post_exploitation #offensive_security #tunneling #pivoting #pentest_tool #redteam
Stars: 92 Issues: 1 Forks: 5
https://github.com/tnpitsecurity/ligolo-ng
GitHub
GitHub - nicocha30/ligolo-ng: An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. - nicocha30/ligolo-ng
Rvn0xsy/red-tldr
red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel with certain experience.
Language: Go
#tldr #redteaming #redteam_tools #redteamers
Stars: 82 Issues: 1 Forks: 5
https://github.com/Rvn0xsy/red-tldr
red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel with certain experience.
Language: Go
#tldr #redteaming #redteam_tools #redteamers
Stars: 82 Issues: 1 Forks: 5
https://github.com/Rvn0xsy/red-tldr
GitHub
GitHub - Rvn0xsy/red-tldr: red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands…
red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel ...
WazeHell/sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Language: Python
#active_directory #exploitation #redteam #s4u2self
Stars: 197 Issues: 0 Forks: 43
https://github.com/WazeHell/sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Language: Python
#active_directory #exploitation #redteam #s4u2self
Stars: 197 Issues: 0 Forks: 43
https://github.com/WazeHell/sam-the-admin
GitHub
GitHub - safebuffer/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user - GitHub - safebuffer/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from st...
mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
GitHub
GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. - mufeedvh/moonwalk
TROUBLE-1/Vajra
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfaces.
Language: CSS
#aws #azure #azuread #cloudsecurity #gcp #redteam_tools #toolkit
Stars: 164 Issues: 0 Forks: 24
https://github.com/TROUBLE-1/Vajra
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfaces.
Language: CSS
#aws #azure #azuread #cloudsecurity #gcp #redteam_tools #toolkit
Stars: 164 Issues: 0 Forks: 24
https://github.com/TROUBLE-1/Vajra
GitHub
GitHub - TROUBLE-1/Vajra: Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure…
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the P...
Esc4iCEscEsc/skanuvaty
Dangerously fast DNS/network/port scanner
Language: Rust
#cybersecurity #dns #dns_client #hacking_tools #osint_tool #penetration_testing #penetration_testing_tools #pentest #pentesting #redteam #redteam_tools #rust #rust_lang #scanner #security #security_tools #subdomain_enumeration #subdomain_scanner
Stars: 139 Issues: 6 Forks: 6
https://github.com/Esc4iCEscEsc/skanuvaty
Dangerously fast DNS/network/port scanner
Language: Rust
#cybersecurity #dns #dns_client #hacking_tools #osint_tool #penetration_testing #penetration_testing_tools #pentest #pentesting #redteam #redteam_tools #rust #rust_lang #scanner #security #security_tools #subdomain_enumeration #subdomain_scanner
Stars: 139 Issues: 6 Forks: 6
https://github.com/Esc4iCEscEsc/skanuvaty
GitHub
GitHub - Esc4iCEscEsc/skanuvaty: Dangerously fast DNS/network/port scanner
Dangerously fast DNS/network/port scanner. Contribute to Esc4iCEscEsc/skanuvaty development by creating an account on GitHub.
Sh0ckFR/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Language: Python
#dll #infosec #library #red_team #red_team_engagement #red_team_tools #red_teaming #redteam #vulnerability
Stars: 124 Issues: 0 Forks: 22
https://github.com/Sh0ckFR/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Language: Python
#dll #infosec #library #red_team #red_team_engagement #red_team_tools #red_teaming #redteam #vulnerability
Stars: 124 Issues: 0 Forks: 22
https://github.com/Sh0ckFR/DLLirant
GitHub
GitHub - Sh0ckFR/DLLirant: DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. - Sh0ckFR/DLLirant
utkusen/socialhunter
crawls the website and finds broken social media links that can be hijacked
Language: Go
#bug_bounty #bugbounty #osint #redteam #redteaming
Stars: 97 Issues: 0 Forks: 8
https://github.com/utkusen/socialhunter
crawls the website and finds broken social media links that can be hijacked
Language: Go
#bug_bounty #bugbounty #osint #redteam #redteaming
Stars: 97 Issues: 0 Forks: 8
https://github.com/utkusen/socialhunter
GitHub
GitHub - utkusen/socialhunter: crawls the website and finds broken social media links that can be hijacked
crawls the website and finds broken social media links that can be hijacked - utkusen/socialhunter
edoardottt/awesome-hacker-search-engines
A list of search engines useful during Penetration testing, vulnerability assessments, red team operations, bug bounty and more
#awesome #awesome_list #awesome_lists #bugbounty #dns #domain #exploit #hacking #hacking_tools #osint #osint_tool #redteam #redteaming #search_engine #security #security_tools #url #vulnerabilities #vulnerability #wifi_network
Stars: 412 Issues: 0 Forks: 20
https://github.com/edoardottt/awesome-hacker-search-engines
A list of search engines useful during Penetration testing, vulnerability assessments, red team operations, bug bounty and more
#awesome #awesome_list #awesome_lists #bugbounty #dns #domain #exploit #hacking #hacking_tools #osint #osint_tool #redteam #redteaming #search_engine #security #security_tools #url #vulnerabilities #vulnerability #wifi_network
Stars: 412 Issues: 0 Forks: 20
https://github.com/edoardottt/awesome-hacker-search-engines
GitHub
GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing,…
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more - edoardottt/awesome-hacker-search-engines
aydinnyunus/exifLooter
finds geolocation on all image urls and directories
Language: Go
#bug_bounty #bugbounty #cyber_security #exif #exif_metadata #exiftool #golang #hack #hacking #image #metadata #metadata_extraction #osint #redteam #security
Stars: 139 Issues: 1 Forks: 4
https://github.com/aydinnyunus/exifLooter
finds geolocation on all image urls and directories
Language: Go
#bug_bounty #bugbounty #cyber_security #exif #exif_metadata #exiftool #golang #hack #hacking #image #metadata #metadata_extraction #osint #redteam #security
Stars: 139 Issues: 1 Forks: 4
https://github.com/aydinnyunus/exifLooter
GitHub
GitHub - aydinnyunus/exifLooter: ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap
ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap - aydinnyunus/exifLooter
Idov31/Sandman
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Language: C#
#backdoor #csharp #cybersecurity #infosec #python #red_team #red_team_tools #redteam #windows
Stars: 120 Issues: 0 Forks: 16
https://github.com/Idov31/Sandman
Sandman is a NTP based backdoor for red team engagements in hardened networks.
Language: C#
#backdoor #csharp #cybersecurity #infosec #python #red_team #red_team_tools #redteam #windows
Stars: 120 Issues: 0 Forks: 16
https://github.com/Idov31/Sandman
GitHub
GitHub - Idov31/Sandman: Sandman is a NTP based backdoor for red team engagements in hardened networks.
Sandman is a NTP based backdoor for red team engagements in hardened networks. - Idov31/Sandman
Kudaes/Elevator
UAC Bypass by abusing RPC and debug objects.
Language: C++
#hacking #redteam #rust #uac_bypass #windows
Stars: 164 Issues: 1 Forks: 15
https://github.com/Kudaes/Elevator
UAC Bypass by abusing RPC and debug objects.
Language: C++
#hacking #redteam #rust #uac_bypass #windows
Stars: 164 Issues: 1 Forks: 15
https://github.com/Kudaes/Elevator
GitHub
GitHub - Kudaes/Elevator: UAC bypass by abusing RPC and debug objects.
UAC bypass by abusing RPC and debug objects. Contribute to Kudaes/Elevator development by creating an account on GitHub.
Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
PoC for a new sleep obfuscation technique leveraging waitable timers to evade memory scanners.
Language: C
#assembly #c #cyber_security #cybersecurity #encryption #evasion #infosec #red_team #redteam #windows
Stars: 212 Issues: 0 Forks: 28
https://github.com/Idov31/Cronos
GitHub
GitHub - Idov31/Cronos: PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners. - Idov31/Cronos
Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
Venom is a library that meant to perform evasive communication using stolen browser socket
Language: C++
#backdoor #cpp #cyber #cyber_security #cybersecurity #infosec #red_team #red_team_tools #redteam #windows
Stars: 160 Issues: 0 Forks: 19
https://github.com/Idov31/Venom
GitHub
GitHub - Idov31/Venom: Venom is a library that meant to perform evasive communication using stolen browser socket
Venom is a library that meant to perform evasive communication using stolen browser socket - Idov31/Venom
CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
GitHub
GitHub - matro7sh/BypassAV: This map lists the essential techniques to bypass anti-virus and EDR
This map lists the essential techniques to bypass anti-virus and EDR - matro7sh/BypassAV
wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
UAC Bypass By Abusing Kerberos Tickets
Language: C#
#infosec #kerberos #redteam #redteam_tools #uac_bypass #windows
Stars: 254 Issues: 1 Forks: 28
https://github.com/wh0amitz/KRBUACBypass
GitHub
GitHub - wh0amitz/KRBUACBypass: UAC Bypass By Abusing Kerberos Tickets
UAC Bypass By Abusing Kerberos Tickets. Contribute to wh0amitz/KRBUACBypass development by creating an account on GitHub.
BlackSnufkin/NovaLdr
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Language: Rust
#malware_development #offensive_security #redteam #rust #shellcode_injection
Stars: 143 Issues: 0 Forks: 19
https://github.com/BlackSnufkin/NovaLdr
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Language: Rust
#malware_development #offensive_security #redteam #rust #shellcode_injection
Stars: 143 Issues: 0 Forks: 19
https://github.com/BlackSnufkin/NovaLdr
GitHub
GitHub - BlackSnufkin/NovaLdr: Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party…
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre) - BlackSnufkin/NovaLdr
Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Language: C++
#cpp #indirect_syscall #loader #manualmapping #redteam
Stars: 185 Issues: 0 Forks: 28
https://github.com/Krypteria/AtlasLdr
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Language: C++
#cpp #indirect_syscall #loader #manualmapping #redteam
Stars: 185 Issues: 0 Forks: 28
https://github.com/Krypteria/AtlasLdr
GitHub
GitHub - Krypteria/AtlasLdr: Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls - Krypteria/AtlasLdr
xaitax/CVE-2024-6387_Check
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Language: Python
#cve_2024_6387 #exploit #pentesting #python3 #redteam
Stars: 343 Issues: 0 Forks: 70
https://github.com/xaitax/CVE-2024-6387_Check
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Language: Python
#cve_2024_6387 #exploit #pentesting #python3 #redteam
Stars: 343 Issues: 0 Forks: 70
https://github.com/xaitax/CVE-2024-6387_Check
GitHub
GitHub - xaitax/CVE-2024-6387_Check: CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running…
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH - xaitax/CVE-2024-6387_Check
safedv/RustiveDump
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission.
Language: Rust
#lsass_dump #offensive_security #redteam #rust_lang
Stars: 123 Issues: 0 Forks: 9
https://github.com/safedv/RustiveDump
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission.
Language: Rust
#lsass_dump #offensive_security #redteam #rust_lang
Stars: 123 Issues: 0 Forks: 9
https://github.com/safedv/RustiveDump
GitHub
GitHub - safedv/RustiveDump: LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and…
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption,...