Stars
Tool for Active Directory Certificate Services enumeration and abuse
PowerShell MachineAccountQuota and DNS exploit tools
A Free to use, Beautiful, Feature Rich, Fully Customizable Flat Modern GUI Template Using Pyside2 designed in Qt Designer, supported for Windows/Linux/Mac OS, Incorporating widgets like Buttons, Pr…
real time face swap and one-click video deepfake with only a single image
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widesprea…
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
Please no pull requests for this repository. Thanks!
POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.