Suborner - The Invisible Account Forger Suborner - The Invisible Account Forger Reviewed by Zion3R on 8:30 AM Rating: 5
BlueHound - Tool That Helps Blue Teams Pinpoint The Security Issues That Actually Matter BlueHound - Tool That Helps Blue Teams Pinpoint The Security Issues That Actually Matter Reviewed by Zion3R on 8:30 AM Rating: 5
DC-Sonar - Analyzing AD Domains For Security Risks Related To User Accounts DC-Sonar - Analyzing AD Domains For Security Risks Related To User Accounts Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
DragonCastle - A PoC That Combines AutodialDLL Lateral Movement Technique And SSP To Scrape NTLM Hashes From LSASS Process DragonCastle - A PoC That Combines AutodialDLL Lateral Movement Technique And SSP To Scrape NTLM Hashes From LSASS Process Reviewed by Zion3R on 8:30 AM Rating: 5
LATMA - Lateral Movement Analyzer Tool LATMA - Lateral Movement Analyzer Tool Reviewed by Zion3R on 8:30 AM Rating: 5
PowerHuntShares - Audit Script Designed In Inventory, Analyze, And Report Excessive Privileges Configured On Active Directory Domains PowerHuntShares - Audit Script Designed In Inventory, Analyze, And Report Excessive Privileges Configured On Active Directory Domains Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
TerraLdr - A Payload Loader Designed With Advanced Evasion Features TerraLdr - A Payload Loader Designed With Advanced Evasion Features Reviewed by Zion3R on 8:30 AM Rating: 5
DotDumper - An Automatic Unpacker And Logger For DotNet Framework Targeting Files DotDumper - An Automatic Unpacker And Logger For DotNet Framework Targeting Files Reviewed by Zion3R on 8:30 AM Rating: 5
PXEThief - Set Of Tooling That Can Extract Passwords From The Operating System Deployment Functionality In Microsoft Endpoint Configuration Manager PXEThief - Set Of Tooling That Can Extract Passwords From The Operating System Deployment Functionality In Microsoft Endpoint Configuration Manager Reviewed by Zion3R on 8:30 AM Rating: 5
laZzzy - Shellcode Loader, Developed Using Different Open-Source Libraries, That Demonstrates Different Execution Techniques laZzzy - Shellcode Loader, Developed Using Different Open-Source Libraries, That Demonstrates Different Execution Techniques Reviewed by Zion3R on 8:30 AM Rating: 5
FarsightAD - PowerShell Script That Aim To Help Uncovering (Eventual) Persistence Mechanisms Deployed By A Threat Actor Following An Active Directory Domain Compromise FarsightAD - PowerShell Script That Aim To Help Uncovering (Eventual) Persistence Mechanisms Deployed By A Threat Actor Following An Active Directory Domain Compromise Reviewed by Zion3R on 8:30 AM Rating: 5
Shells - Little Script For Generating Revshells Shells - Little Script For Generating Revshells Reviewed by Zion3R on 8:30 AM Rating: 5
Sandbox_Scryer - Tool For Producing Threat Hunting And Intelligence Data From Public Sandbox Detonation Output Sandbox_Scryer - Tool For Producing Threat Hunting And Intelligence Data From Public Sandbox Detonation Output Reviewed by Zion3R on 9:30 AM Rating: 5
TeamFiltration - Cross-Platform Framework For Enumerating, Spraying, Exfiltrating, And Backdooring O365 AAD Accounts TeamFiltration - Cross-Platform Framework For Enumerating, Spraying, Exfiltrating, And Backdooring O365 AAD Accounts Reviewed by Zion3R on 8:30 AM Rating: 5
Collect-MemoryDump - Automated Creation Of Windows Memory Snapshots For DFIR Collect-MemoryDump - Automated Creation Of Windows Memory Snapshots For DFIR Reviewed by Zion3R on 8:30 AM Rating: 5
Sandman - NTP Based Backdoor For Red Team Engagements In Hardened Networks Sandman - NTP Based Backdoor For Red Team Engagements In Hardened Networks Reviewed by Zion3R on 8:30 AM Rating: 5
Whids - Open Source EDR For Windows Whids - Open Source EDR For Windows Reviewed by Zion3R on 8:30 AM Rating: 5
ProtectMyTooling - Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry ProtectMyTooling - Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry Reviewed by Zion3R on 8:30 AM Rating: 5
PenguinTrace - Tool To Show How Code Runs At The Hardware Level PenguinTrace - Tool To Show How Code Runs At The Hardware Level Reviewed by Zion3R on 8:30 AM Rating: 5
FUD-UUID-Shellcode - Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings madness FUD-UUID-Shellcode - Another shellcode injection technique using C++ that attempts to bypass Windows Defender using XOR encryption sorcery and UUID strings madness Reviewed by Zion3R on 8:30 AM Rating: 5