Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE…
ForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for arbitrary users…
Rdesktop is an open source client for Microsoft's RDP protocol. It is known to work with Windows versions ranging from…
XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and…
PowerShx is a rewrite and expansion on the PowerShdll project. PowerShx provide functionalities for bypassing AMSI and running PS Cmdlets. Features Run…
The best form of defense against a Trojan horse attack is prevention. Always ensure that the emails, websites, and links…
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process…
Attack-Surface-Framework aims to protect organizations acting as an attack surface watchdog, provided an “Object” which might be a: Domain, IP…
SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly…
PKINITtools repository contains some utilities for playing with PKINIT and certificates.The tools are built on minikerberos and impacket. Accompanying blogpost with more context: https://dirkjanm.io/ntlm-relaying-to-ad-certificate-services/…