Skip to content
View Sayton7's full-sized avatar

Block or report Sayton7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results
Python 2,183 414 Updated Dec 8, 2023

ZAP Add-ons

HTML 840 704 Updated Nov 16, 2024

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …

Go 20,687 2,513 Updated Nov 15, 2024

SSLScrape | A scanning tool for scaping hostnames from SSL certificates.

Python 329 102 Updated Apr 29, 2021

⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.

Python 743 127 Updated Jun 13, 2023

EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.

Python 4,991 848 Updated Oct 22, 2024

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 23,692 3,076 Updated Aug 13, 2024

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Go 5,083 803 Updated Oct 15, 2024

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

PowerShell 1,819 326 Updated Oct 18, 2024

PowerShell Runspace Post Exploitation Toolkit

C# 1,523 336 Updated Aug 2, 2019

Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

PowerShell 8,799 2,447 Updated Apr 25, 2024
PHP 3,454 604 Updated Mar 14, 2024

Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources

C# 1,481 300 Updated Jun 30, 2023

A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls

Python 433 87 Updated Sep 9, 2022

Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be cha…

HTML 327 19 Updated Nov 17, 2024

AI-Powered Ethical Hacking Assistant

Python 450 42 Updated Jul 22, 2024

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams

HCL 373 73 Updated Mar 5, 2020

A GPT-empowered penetration testing tool

Python 7,253 879 Updated Nov 9, 2024

Tools & Interesting Things for RedTeam Ops

Python 2,145 362 Updated Nov 16, 2022

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 9,481 2,264 Updated Mar 17, 2024

Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C

Python 8,460 1,819 Updated Mar 22, 2024

Run PowerShell command without invoking powershell.exe

Python 1,474 251 Updated Mar 23, 2023

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 7,103 999 Updated Nov 10, 2024

C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.

C# 376 66 Updated Sep 1, 2024

Bypass AMSI by patching AmsiScanBuffer

C# 252 48 Updated Jun 4, 2021

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,736 815 Updated Jan 24, 2024

Defeating Windows User Account Control

C 6,377 1,325 Updated Jul 22, 2024

The Hunt for Malicious Strings

C# 1,094 155 Updated Aug 21, 2022

The FLARE team's open-source tool to identify capabilities in executable files.

Python 4,876 560 Updated Nov 15, 2024
Next