Stars
Step By step sync between Github and AWS S3 bucket using Github Actions
A BloodHound collector for Microsoft Configuration Manager
A tiny tool built to help AD Admins tame the Protected Users group.
🍏 + 🎯 + 🐍 = Everything you need to query Apple's FindMy network!
Tool to bypass LSA Protection (aka Protected Process Light)
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
reliable fake and temp email filter solution for site operators
NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.
Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.
This map lists the essential techniques to bypass anti-virus and EDR
zimedev / certipy-merged
Forked from ly4k/CertipyTool for Active Directory Certificate Services enumeration and abuse
AV/EDR Lab environment setup references to help in Malware development
リアルタイムボイスチェンジャー Realtime Voice Changer
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
Zero shot vulnerability discovery using LLMs
real time face swap and one-click video deepfake with only a single image
Full Build Guide for making your own Clipboard Cloner!