There are no reviews yet. Be the first to send feedback to the community and the maintainers!
social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.ptf
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.hate_crack
A tool for automating cracking methodologies through Hashcat from the TrustedSec team.CS-Situational-Awareness-BOF
Situational Awareness commands implemented using Beacon Object Filestrevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.SysmonCommunityGuide
TrustedSec Sysinternals Sysmon Community GuideCS-Remote-OPs-BOF
cve-2019-19781
This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.meterssh
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.COFFLoader
nps_payload
This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources. Written by Larry Spohn (@Spoonman1091) Payload written by Ben Mauch (@Ben0xA) aka dirty_bentap
The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an organization.orpheus
Bypassing Kerberoast Detections with Modified KDC Options and Encryption Typeshardcidr
hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The route server is selected at random at runtime.egressbuster
Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.artillery
The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.spraywmi
SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on a system.ELFLoader
ridenum
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.The_Shelf
Retired TrustedSec CapabilitiesObsidian-Vault-Structure
SeeYouCM-Thief
User-Behavior-Mapping-Tool
specula
spoonmap
SliverKeylogger
pivoter
Pivoter is a proxy tool for pentesters to have easier lateral movement.CrackHound
PPLFaultDumpBOF
cors-poc
SHIPS
The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator passwords for environments where it is not possible or not appropriate to disable these local accounts. Clients may be configured to rotate passwords automatically. Stored passwords can be retrieved by desktop support personnel as required, or updated when a password has to be manually changed in the course of system maintenance. By having unique passwords on each machine and logging of password retrievals, security can be improved my making networks more resistant to lateral movement by attackers and enhancing the ability to attribute actions to individual persons.quicksql
QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to use.tscopy
HoneyBadger
conqr
ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.auto_SettingContent-ms
This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remote code execution. This automates generating an HTA downloader and embeds it in the SettingContent-ms file for you and starts Apache.defensive-scripts
wpupdate
WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.proxy_helper
Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.Windows-MS-LSAT-RPC-Example
Windows RPC example calling stubs generated from MS-LSAT and MS-LSADhash_parser
This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want to see if any of the credentials work on another domain or other systems.Zoinks
Manage Engine DecrypterVerifyELF
inProc_Evade_Get-InjectedThread
PoC code from blogscriptkiddie-wmi-provider
TCS_InjectionTechniques
RisingSun
RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.LLVM-Obfuscation-Experiments
Love Open Source and this site? Check out how you can help us