The pentester's Swiss knife

Artifact Composition

guac: Graph for Understanding Artifact Composition

GUAC: Graph for Understanding Artifact Composition Graph for Understanding Artifact Composition (GUAC) aggregates software security metadata into a high-fidelity graph database—normalizing entity identities and mapping standard relationships between them. Querying this graph can drive...

CI/CD Goat

CI/CD Goat: deliberately vulnerable CI/CD environment

cicd-goat The CI/CD Goat project allows engineers and security practitioners to learn and practice CI/CD security through a set of 10 challenges, enacted against a real, full-blown CI/CD environment. The scenarios are of varying...

LSASS process

NanoDump: creates a minidump of the LSASS process

NanoDump A flexible tool that creates a minidump of the LSASS process. Feature Process forking   To avoid opening a handle to LSASS with PROCESS_VM_READ, you can use the –fork parameter. This will make nanodump create a...

Microsoft Graph exploitation

Graphpython: The Swiss Army Knife for Microsoft Graph Exploitation

Graphpython Graphpython is a modular Python tool for cross-platform Microsoft Graph API enumeration and exploitation. It builds upon the capabilities of AADInternals (Killchain.ps1), GraphRunner, and TokenTactics(V2) to provide a comprehensive solution for interacting with...