Block or Report
Block or report coldfusion39
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (14)
Sort Name ascending (A-Z)
Stars
Language: Python
Sort by: Most stars
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Tool for Active Directory Certificate Services enumeration and abuse
Stealing Signatures and Making One Invalid Signature at a Time
Extract credentials from lsass remotely
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
A Python based ingestor for BloodHound
A collection of Azure AD/Entra tools for offensive and defensive security purposes
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
PoC for Zerologon - all research credits go to Tom Tervoort of Secura
Kerberos unconstrained delegation abuse toolkit
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Exchange your privileges for Domain Admin privs by abusing Exchange
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Active Directory Integrated DNS dumping by any authenticated user
A (partial) Python rewriting of PowerSploit's PowerView
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
Python script to enumerate users, groups and computers from a Windows domain through LDAP queries