Loading...
Loading...
Avg 513.9 stars per repo.
16 new projects with 867 stars.
Coding for 9 years.

At SpecterOps, we believe that we can influence our industry's maturation by contributing to the collective knowledge base. We do this by opening our ideas and hypotheses to inspection and criticism. That includes publishing our development works and contributing to the open-source community.
SpecterOps employees control their projects and maintain intellectual property rights and licenses, so most of the projects sponsored by SpecterOps are spread out over many individual GitHub profiles and organizations. We have organized these projects here for your perusal.
You can read more about our commitment to transparency here: A Push Toward Transparency
The following projects are some of the larger open-source projects SpecterOps has, and continues to, sponsor and support. We hope you find them useful!

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/BloodHoundAD/BloodHound| |Documentation|https://bloodhound.readthedocs.io/en/latest/index.html|

Ghostwriter is a part of your team. It helps you manage clients, projects, reports, and infrastructure in one application. It does not replace some of the more common or traditional project management tools, such as CRMs. Still, it does consolidate all relevant project information in a way for users to easily curate every aspect of their projects.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/GhostManager/Ghostwriter| |Homepage|https://ghostwriter.wiki| |Documentation|https://www.ghostwriter.wiki/|

A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/its-a-feature/Mythic| |Documentation|https://docs.mythic-c2.net/|

Merlin is a cross-platform post-exploitation Command & Control server and agent written in Go.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/Ne0nd0g/merlin|

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/cobbr/Covenant| |Homepage|https://cobbr.io/Covenant.html| |Documentation|https://github.com/cobbr/Covenant/wiki|

A C# Command & Control framework
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/DragoQCC/HardHatC2|
SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/cobbr/SharpSploit| |Homepage|https://sharpsploit.cobbr.io/api/|
SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and credential gathering without requiring access to the SCCM administration console GUI.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/Mayyhem/SharpSCCM|
This project converts a Cobalt Strike profile to a functional mod_rewrite .htaccess or Nginx config file to support HTTP reverse proxy redirection to a Cobalt Strike teamserver. The use of reverse proxies provides protection to backend C2 servers from profiling, investigation, and general internet background radiation.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/threatexpress/cs2modrewrite|
Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/threatexpress/domainhunter| |Homepage|http://threatexpress.com|
Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/GhostPack/KeeThief|
Cobalt Strike Malleable C2 Design and Reference Guide
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/threatexpress/malleable-c2|
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/0xthirteen/SharpRDP|
Cobalt Strike kit for Persistence
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/0xthirteen/StayKit|
PowerSploit - A PowerShell Post-Exploitation Framework
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/PowerShellMafia/PowerSploit|

Empire is a post-exploitation framework with a pure-PowerShell 2.0 Windows agent and a pure Python 2.6/2.7 Linux/OS X agent. It is the merge of the previous PowerShell Empire and Python EmPyre projects. The framework offers cryptological-secure communications and a flexible architecture. On the PowerShell side, Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. PowerShell Empire premiered at BSidesLV in 2015, and Python EmPyre premiered at HackMiami in 2016.
The project was retired in 2019, but the code is still available for reference. You can learn more about the end of the project here: https://mobile.twitter.com/specterops/status/1156650932421050368
|Resource|Link| | :--- | :--- | |GitHub|https://github.com/EmpireProject/Empire| |Homepage|http://www.powershellempire.com/|
SpecterOps employees have also created and contributed to many other projects, too numerous to list in detail here. These projects are listed below, sorted by the owner's profile.