[go: up one dir, main page]

Skip to content
View Lyc4on's full-sized avatar
  • Singapore

Block or report Lyc4on

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

CONTROL C2 is a command and control framework designed for red teamers and penetration testers.

13 2 Updated Oct 16, 2024

PowerShell MachineAccountQuota and DNS exploit tools

PowerShell 1,236 176 Updated Jan 11, 2023

PowerShell script to generate ShellCode in various formats

PowerShell 39 9 Updated Sep 25, 2024

Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…

Go 740 126 Updated Aug 18, 2023

You didn't think I'd go and leave the blue team out, right?

1,610 237 Updated Sep 19, 2023

Tool to bypass LSA Protection (aka Protected Process Light)

C++ 898 135 Updated Dec 4, 2022

Microsoft signed ActiveDirectory PowerShell module

PowerShell 846 198 Updated Oct 3, 2019

🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! πŸ§™β€β™€οΈ

Python 6,656 358 Updated Oct 31, 2023

FakeNet-NG - Next Generation Dynamic Network Analysis Tool

Python 1,803 361 Updated Nov 5, 2024

Automated Adversary Emulation Platform

Python 5,655 1,074 Updated Nov 1, 2024

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

Go 2,810 283 Updated Nov 4, 2024

Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

PowerShell 8,799 2,447 Updated Apr 25, 2024

Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.

C++ 5,276 1,018 Updated Oct 9, 2024

A repository that maps API calls to Sysmon Event ID's.

116 19 Updated Nov 14, 2022

A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.

C# 2,130 396 Updated Dec 27, 2023

Trying to tame the three-headed dog.

C# 4,135 781 Updated Sep 12, 2024

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 11,922 4,612 Updated Aug 17, 2020

Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.

C# 1,046 124 Updated Jun 1, 2024

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

Boo 2,196 404 Updated Dec 6, 2023

HTA encryption tool for RedTeams

Python 1,371 256 Updated Nov 9, 2022

Defanged Indicator of Compromise (IOC) Extractor.

Python 506 91 Updated Aug 28, 2024

A tool to create a JScript file which loads a .NET v2 assembly from memory.

C# 1,240 298 Updated Jan 18, 2021

The Network Execution Tool

Python 3,264 358 Updated Nov 16, 2024

Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.

2,300 338 Updated Nov 12, 2024

A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.

C# 1,161 420 Updated Jan 4, 2024

Red Teaming Tactics and Techniques

PowerShell 4,063 1,058 Updated Aug 22, 2024

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

5,672 1,209 Updated Oct 4, 2024

Powershell tool to automate Active Directory enumeration.

PowerShell 1,008 127 Updated Jul 24, 2024

Execute unmanaged Windows executables in CobaltStrike Beacons

C 636 98 Updated Mar 4, 2023

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,721 284 Updated Jun 15, 2020
Next