- All languages
- ActionScript
- Apex
- Arduino
- Assembly
- Astro
- AutoHotkey
- Batchfile
- Bicep
- BlitzBasic
- Brightscript
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Dart
- Dockerfile
- Elixir
- Erlang
- GDScript
- Go
- Groovy
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jsonnet
- Jupyter Notebook
- Kotlin
- Less
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- Meson
- Mustache
- Objective-C
- OpenSCAD
- PHP
- PLpgSQL
- Pascal
- Perl
- PostScript
- PowerShell
- PureScript
- Python
- R
- Roff
- Ruby
- Rust
- SCSS
- SaltStack
- Scala
- Shell
- Smarty
- Standard ML
- Swift
- TeX
- Twig
- TypeScript
- VBScript
- Vala
- Vim Script
- Visual Basic
- Vue
- XSLT
- Zig
- hoon
- nesC
Starred repositories
A command-line installer for Windows.
.NET news, announcements, release notes, and more!
Script to remove Windows 10 bloatware.
🚀 An open and lightweight modification to Windows, designed to optimize performance, privacy and usability.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
⚡ The most powerful PowerShell module on GitHub for fine-tuning Windows 10 & Windows 11
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Automation for internal Windows Penetrationtest / AD-Security
A repository of sysmon configuration modules
A collection of Red Team focused tools, scripts, and notes
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
Various PowerShell scripts that may be useful during red team exercise
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on
PowerShell module to automate ServiceNow service and asset management. This module can be used standalone, with Azure Automation, or Docker.
Scanners for Jar files that may be vulnerable to CVE-2021-44228
PowerShell Module for automating Tenable Nessus Vulnerability Scanner.
.Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac
Merges multiple .nessus files into one file.
Tools I use on red team engagements and more