- The Matrix
Block or Report
Block or report th3k3ymak3r
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLanguage
Sort by: Recently starred
Starred repositories
Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.
.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypa…
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Allows you to retrieve information on linkedin profiles, companies on linkedin and search on linkedin companies/persons
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
A collection of most useful osint tools for SOCINT.
This is an AD pentest tools collection
Fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike.
Kerberos unconstrained delegation abuse toolkit
Active Directory Audit Tools for IT Audits
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
C3n7ral051nt4g3ncy / Eyes
Forked from N0rz3/Eyes🕵️ Email osint tool
Two in one, patch lifetime powershell console, no more etw and amsi!
smbclient-ng, a fast and user friendly way to interact with SMB shares.
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
Evilginx Phishing Engagement Infrastructure Setup Guide
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
A Powerful Network Reconnaissance Tool for Security Professionals
PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges required )
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
A collection of tools that I use in CTF's or for assessments
DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking
A fast and comprehensive tool for organizational network scanning
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32