offsecguy's starred repositories
PowerAssembly
Map remote .NET assemblies to memory for further invocation.
ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
PowerShdll
Run PowerShell with rundll32. Bypass software restrictions.
RasmanPotato
Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do
BloodHound-Tools
Collection of tools that reflect the network dimension into Bloodhound's data
adidnsdump
Active Directory Integrated DNS dumping by any authenticated user
SpoolSample
PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.
SharpPrinter
Discover Printers
SharpOxidResolver
IOXIDResolver from AirBus Security/PingCastle
SharpHound
C# Data Collector for BloodHound
pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
Internal-Monologue
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS