Block or Report
Block or report ShutdownRepo
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Assess the security of your Active Directory with few or all privileges.
The Dom amongst the Flipper Zero Firmware. Give your Flipper the power and freedom it is really craving. Let it show you its true form. Dont delay, switch to the one and only true Master today!
A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.
Ask a TGS on behalf of another user without password
Fully featured and community-driven hacking environment
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
Kraken, a modular multi-language webshell coded by @secu_x11
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg…
Username tools for penetration testing
D2 is a modern diagram scripting language that turns text to diagrams.
aas-n / aclpwn.py
Forked from fox-it/aclpwn.pyActive Directory ACL exploitation with BloodHound
Active Directory data collector for BloodHound written in Rust. 🦀
DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replication-Get-Changes-In-Filtered-Set.
🐬 A collection of awesome resources for the Flipper Zero device.
A python script to dump all the challenges locally of a CTFd-based Capture the Flag.
Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.
Check for LDAP protections regarding the relay of NTLM authentication
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat…
Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)