Statistics for topic offensive-security
RepositoryStats tracks 595,858 Github repositories, of these 179 are tagged with the offensive-security topic. The most common primary language for repositories using this topic is Python (50). Other languages include: Go (18), PowerShell (13), Rust (12)
Stargazers over time for topic offensive-security
Most starred repositories for topic offensive-security (view more)
Trending repositories for topic offensive-security (view more)
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber Intelligence missions.
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and indirect NTAPIs for core operations.
Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber Intelligence missions.
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption, an...
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption, an...