- 
                  Available
 - Barcelona
 - in/dariomoreescamez
 
- 
  
printerbugnew-red-exploit-CVE-2025-54918-DCs-running-2025-allow-reflection-RPC-LDAPS Public
Forked from decoder-it/printerbugnewThe DCERPC only printerbug.py version
Python UpdatedNov 3, 2025  - 
  
SilentButDeadly-red-block-cloudconnectivity-EDR-netw-comms-with-WFP Public
Forked from loosehose/SilentButDeadlySilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…
C UpdatedNov 3, 2025  - 
  
trivy-tfsec-vulnerability-misconfig-secret-sbom-containers-k8s Public
Forked from aquasecurity/trivyFind vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Go Apache License 2.0 UpdatedNov 3, 2025  - 
  
MS-RPC-Fuzzer-beware-will-break-os-red Public
Forked from warpnet/MS-RPC-FuzzerGain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully…
C# Apache License 2.0 UpdatedNov 2, 2025  - 
  
BOF_Spawn-CS-red-process-spawning-and-shellcode-injection-Draugr-stack-spoofing Public
Forked from NtDallas/BOF_SpawnCobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames
C++ UpdatedNov 1, 2025  - 
  
sigma-blue-siem-rules Public
Forked from SigmaHQ/sigmaMain Sigma Rule Repository
Python Other UpdatedNov 1, 2025  - 
  
COM-Fuzzer-red-find-vulnerable-D-COM-clsid Public
Forked from warpnet/COM-FuzzerGain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopeful…
 - 
  
EDR-Redir-red-redirect-EDR-folder-elsewhere Public
Forked from TwoSevenOneT/EDR-RedirEDR-Redir : a tool used to redirect the EDR's folder to another location.
C++ UpdatedOct 29, 2025  - 
  
Ebyte-Syscalls-red-obfuscating-function-calls-vectored-exception-redirection-byte-swap Public
Forked from EvilBytecode/Ebyte-SyscallsObfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swapping without memory or assembly allocation.
 - 
  
retina-blue-k8s-network-observability-hub-security-compliance-network-health-ebfp-cloud-agnostic Public
Forked from microsoft/retinaeBPF distributed networking observability tool for Kubernetes
Go MIT License UpdatedOct 25, 2025  - 
  
Group3r-blue-AD-group-policy-find-vulns Public
Forked from Group3r/Group3rFind vulnerabilities in AD Group Policy, but do it better than Grouper2 did.
C# GNU General Public License v3.0 UpdatedOct 23, 2025  - 
  
GroupPolicyBackdoor-recon-manipulation-explotation-priv-esc Public
Forked from synacktiv/GroupPolicyBackdoorGroup Policy Objects manipulation and exploitation framework
Python UpdatedOct 21, 2025  - 
  
PingOneHound-red-ident-analyse-execute-attack-paths-audit-RBAC-funcionality-and-misconfigs Public
Forked from andyrobbins/PingOneHoundSix Degrees of Organization Admin
PowerShell GNU General Public License v3.0 UpdatedOct 21, 2025  - 
  
Detecting-Indirect-Syscalls-blue-monitor-and-detect-windows_security Public
Forked from EvilBytecode/Detecting-Indirect-SyscallsDetection of indirect syscall techniques using hardware breakpoints and vectored exception handling.
C++ UpdatedOct 19, 2025  - 
  
OUned-red-DACL-abuse-via-manipulating-Gplink-attack-exploit-AD-OU-units-defcon33 Public
Forked from synacktiv/OUnedThe OUned A D Org Units ACL exploitation through gPLink poisoning
 - 
  
bloodyAD-red-PrivEsc-Framework Public
Forked from CravateRouge/bloodyADBloodyAD is an Active Directory Privilege Escalation Framework
Python MIT License UpdatedOct 18, 2025  - 
  
GPOZaurr-recon-and-harden-powershell Public
Forked from EvotecIT/GPOZaurrGroup Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.
PowerShell UpdatedOct 14, 2025  - 
  
KrbRelayEx-red-kerberos-Fake-RPC-DCOM-MiTM-Server Public
Forked from decoder-it/KrbRelayEx-RPCC# UpdatedOct 9, 2025  - 
  
evilwaf-red-pentest-detect-and-bypass-WAF Public template
Forked from matrixleons/evilwafevilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
Python MIT License UpdatedOct 7, 2025  - 
  
NetworkHound-red-AD-comprehensive-network-topology-analizer-with-SMB-validat-NTLM-krb-find-DCs Public
Forked from MorDavid/NetworkHoundAdvanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
Python UpdatedOct 4, 2025  - 
  
SockTail-red-joins-a-device-to-a-Tailscale-network-and-exposes-a-local-SOCKS5-prox Public
Forked from Yeeb1/SockTailLightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale’s …
Go UpdatedOct 3, 2025  - 
  
InternalAllTheThings-Red Public
Forked from swisskyrepo/InternalAllTheThingsActive Directory and Internal Pentest Cheatsheets
HTML UpdatedOct 2, 2025  - 
  
ADACLScanner-red-AD-ACL-object-rights-enum-viewer Public
Forked from canix1/ADACLScannerRepo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory
PowerShell Microsoft Public License UpdatedOct 1, 2025  - 
  
systeminformer-red-blue-monitor-sys-processes Public
Forked from winsiderss/systeminformerA free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
C MIT License UpdatedOct 1, 2025  - 
  
Home-Grown-Red-Team Public
Forked from assume-breach/Home-Grown-Red-TeamHome-Grown-Red-Team
Python UpdatedSep 30, 2025  - 
  
EntraGoat-red-blue-pentest-deliberate-vuln-EntraID-env Public
Forked from Semperis/EntraGoatA deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.
PowerShell MIT License UpdatedSep 25, 2025  - 
  
Timeroast-red-ad-netexec-ntp-hashes-for-hashcat Public
Forked from SecuraBV/TimeroastTimeroasting scripts by Tom Tervoort
Python MIT License UpdatedSep 19, 2025  - 
  
aced-red-parse-single-principal-DACL-inbound-access-and-SIDS Public
Forked from garrettfoster13/acedPython MIT License UpdatedSep 16, 2025  - 
  
ironfish-latest Public
Forked from iron-fish/ironfishA novel cryptocurrency focused on privacy and accessibility.
TypeScript Mozilla Public License 2.0 UpdatedSep 16, 2025  - 
  
Coercer-red-force-auth-arbitrary-mach Public
Forked from p0dalirius/CoercerA python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
 

