Hacking
Suricata, Snort and Zeek IDS rule and pcap testing system
A tool for deploying and detecting use of Active Directory honeytokens
Cloudy Loot is a tool to look for cloud tools, configuration files, keys, and secrets.
GoldenSAML Attack Libraries and Framework
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those fil…
Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
A script for tracking and decoding input data messages sent to and from a particular Ethereum address or from every transaction in a block.
Enumerate Microsoft 365 Groups in a tenant with their metadata
A collection of Azure AD/Entra tools for offensive and defensive security purposes
Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager
Situational Awareness commands implemented using Beacon Object Files
Enumerate and disable common sources of telemetry used by AV/EDR.
AV/EDR evasion via direct system calls.
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Implementation of the compression algorithm used in VBA projects within MS Office applications in C#
A web crawler (for bug hunting) that gathers more than you can imagine.
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.
This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially documented and cannot be found in Windows Driver Kit (WDK) header…
Source code for the Build-it Break-it Fix-it competition's infrastructure.