The Exploiter's starred repositories
WindowsSpyBlocker
Block spying and tracking on Windows
EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers.
TCM-Security-Sample-Pentest-Report
Sample pentest report provided by TCM Security
ReverseTCPShell
PowerShell ReverseTCP Shell - Framework
atomic-threat-coverage
Actionable analytics designed to combat threats
adidnsdump
Active Directory Integrated DNS dumping by any authenticated user
purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
PacketWhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
security-courses
various courses, presentation etc.
BlueCommand
Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard
dns-exfiltration
Exfiltrate files via DNS
TestAntivirus
Test if an antivirus is installed via the resolution of the service virtual SID
AdvancedWebHackingWorkshop
Examples for Advanced Web Hacking Workshop