Block or Report
Block or report lapolis
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (19)
Sort Name ascending (A-Z)
AD - Enumeration
Tools to collect AD dataAD - Exploitation
Bunch of tools for AD testingAzure AD
Azure AD exploitation and enumeration toolkitsBypass Utils
C2 Utils
Various utils and BOFsCloud Testing
Tools to aid could config reviewsImplants Coding
Bunch of tools to (try to) bypass thingsLocal PrivEsc
Offensive Utils
Various Utils for PentestersOSINT
General OSINT toolsPhishing
PT - Mitre
RE
Reporting
Stuff to save time reportingsdr*
Shellcode Utils
Shellcode Manipulation (fancy term to say pretty print bin data)Sysadmin Utils
Various good to know utilitiesTest Lab
Test lab tools for both creating and detectingWeb-API-Misc
Stars
Language
Sort by: Recently starred
Windows desktop CVSS calculator for easier report writing
A utility library to handle Common Vulnerability Scoring System (CVSS) v3 Vectors and calculate their scores.
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules without Admin privileges
Evilginx Phishing Engagement Infrastructure Setup Guide
Research into WinSxS binaries and finding hijackable paths
A memory-based evasion technique which makes shellcode invisible from process start to end.
Unorthodox and stealthy way to inject a DLL into the explorer using icons
A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.
Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.
Microsoft Developer Blogs Search Tool
Python's http.server extended to include a file upload page
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
Simulate the behavior of AV/EDR for malware development training.
A curated list of software and architecture related design patterns.
C# obfuscator that bypass windows defender
Hide shellcode by shuffling bytes into a random array and reconstruct at runtime