Highlights
- Pro
Block or Report
Block or report carnal0wnage
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Real-time, container-based file scanning at enterprise scale
Repurpose your YouTube videos by converting them into blog posts.
A utility to safely generate malicious network traffic patterns and evaluate controls.
The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).
pandazheng / DylibHijack
Forked from ababook/DylibHijackpython utilities related to dylib hijacking on OS X
cyberark / kubesploit
Forked from Ne0nd0g/merlinKubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
A collection of red team and adversary emulation resources developed and released by MITRE.
Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit
Review Access - kubectl plugin to show an access matrix for k8s server resources
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
PCAP Samples for Different Post Exploitation Techniques
A collection of scripts for assessing Microsoft Azure security
Local penetration testing lab using docker-compose.
Native Mac APIs for Go. Previously known as MacDriver
Forked and updated with some additional features over the original
An intentionally vulnerable NGINX setup
ScareCrow - Payload creation framework designed around EDR bypass.
A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestration