Lists (32)
Sort Name ascending (A-Z)
AD Attack Path Discovery/Exploitation
BOFs
BYOVD
C2 - C2 Channels
Different C2 Channels/IdeasC2 capabilities
Cloud Security
COM/DCOM
Creds
Crystal Palace
Defense tools
EDR Offensive Tools
Tools that target EDREvasion tools
How to
iOS
Lateral movement
LLM - Offensive Uses
LLM Security
Network tools
Non-hacking
OSCP
Payload Delivery
Persistence
Phishing
Post Beachhead Recon
Privesc
Purple Team
Recon
Red Team Infra
Stunt Hacking
Tools
Vibe
Vulnerability Research
Starred repositories
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
The headless browser for AI agents and web scraping
DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.
Claude Code inference provider for Pi that uses ACP to talk to real Claude Code and allows the use of Pro/Max subscriptions
Instant, Concurrent, Secure & Lightweight Sandbox for AI Agents.
control your applications using pi-coding-agent. fully invisible.
A fileless C2 framework written in pure x64 Linux Assembly with zero libc dependencies. Features dynamic protocol pivoting between raw ICMP sockets and DNS (UDP/53) via in-memory VTable manipulatio…
Ground Station is all-in-one satellite monitoring suite
Drop a single binary into a compromised Kubernetes pod and instantly map every realistic attack path to cluster-admin, node escape, secret theft, and cloud IAM takeover.
A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.
Play Doom entirely from DNS records. (PowerShell 7+)
Reimplementing Havoc Pro Runtime Channel Switching and Cobalt Strike UDC2 features.
A yt-dlp plugin to unlock the cookie database of chromium-based browsers
psexecsvc - a python implementation of PSExec's native service implementation
Extract Windows credentials directly from VM memory snapshots and virtual disks
KslDump — Why bring your own knife when Defender already left one in the kitchen?
AI agent toolkit: coding agent CLI, unified LLM API, TUI & web UI libraries, Slack bot, vLLM pods
Pi extension for async subagent delegation with truncation, artifacts, and session sharing
Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.
754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF · agentskills.io standard · Works with Claude Code, GitHub …
We took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.
MCP server for analyzing PE, ELF, and Mach-O binaries using LIEF
Use this skill to enable Claude Code to communicate directly with your Google NotebookLM notebooks. Query your uploaded documents and get source-grounded, citation-backed answers from Gemini. Featu…
High-performance code intelligence MCP server. Indexes codebases into a persistent knowledge graph — average repo in milliseconds. 66 languages, sub-ms queries, 99% fewer tokens. Single static bina…