Submit your favorite resources for free.
Tools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.
BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.
Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.
Aikido is a security platform for code and cloud, designed to automatically find and fix vulnerabilities in one central system.
Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack, implemented in C++ and Python.
AutoRecon is a network reconnaissance tool that automates service enumeration and port scanning for multiple targets.
BC Security provides cybersecurity assessments and training, offering technical expertise and compliance knowledge for today's business world.
BloodHound Query Library appears to be a resource for pre-built queries designed for use with BloodHound, a tool for analyzing Active Directory environments.
Brute Ratel C4 is a customized command and control center designed for red team and adversary simulation, offering advanced evasion techniques.
Brutus by Praetorian is a CI/CD security tool that automates the discovery of vulnerabilities in build pipelines for red teams and security engineers.
Certipy is a toolkit for enumerating and abusing Active Directory Certificate Services (AD CS) with ESC1-ESC16 attack path support.
Chisel: A fast TCP/UDP tunnel over HTTP, secured via SSH. Useful for firewalls, providing secure network endpoints.
ChromeAlone transforms Chromium browsers into C2 implants, enabling covert operations with session stealing, credential capture, and remote execution.