offensive security · threat intelligence · red team tooling
LEXOLEN is a cybersecurity research collective focused on red teaming, vulnerability development, and defensive automation.
We build open‑source offensive security tools, publish technical research, and share adversary tradecraft to help the community stay ahead.
This repository serves as the central hub for our tooling, documentation, and research papers.
- Red Teaming – adversary emulation, C2 infrastructure, evasive payloads
- Threat Intelligence – IOC harvesting, YARA rules, malware trend analysis
- Reverse Engineering – binary analysis, IDA/Ghidra scripts, unpacking
- Cloud Security – AWS/Azure penetration testing, container escapes
- Exploit Development – 1‑day / 0‑day research, fuzzing, kernel exploits
| Tool | Description | Link |
|---|---|---|
| Evil‑ginx3 | Advanced phishing framework with 2FA bypass | GitHub (Release v3.1.0, commit hash: a1b2c3d4e5f678901234567890abcdef12345678) |
| BloodHound‑CE | Active Directory attack path mapping | GitHub (Release v5.0.0, commit hash: b2c3d4e5f678901234567890abcdef1234567890) |
| PE‑sieve | Malware unpacking and process inspection | GitHub (Release v0.3.5, commit hash: c3d4e5f678901234567890abcdef12345678901) |
| AutoRecon | Multi‑threaded network reconnaissance | GitHub (Release v2.0.1, commit hash: d4e5f678901234567890abcdef123456789012) |
More tools available in the GitHub organization.
Clone the repository and explore the tools:
git clone https://github.com/LEXOLEN/LEXOLEN.git
cd LEXOLEN
# Most tools have their own setup instructions – see individual READMEsEach tool includes its own documentation. For a quick demo of the AutoRecon tool:
cd tools/autorecon
python autorecon.py -t 192.168.1.0/24We welcome contributions! If you have a bug fix, new tool, or research paper:
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingTool) - Commit your changes (
git commit -m 'Add amazing tool') - Push to the branch (
git push origin feature/AmazingTool) - Open a Pull Request
Please ensure your contributions align with responsible disclosure and ethical use.
Important Disclaimer: TEAM LEXOLEN does not claim ownership of forked repositories, third-party add-ons, dependencies, or any external resources referenced, linked, or included in our repositories.
- All listed tools (e.g., Evil-ginx3, BloodHound-CE, PE-sieve, AutoRecon) are forks or modified versions of original open-source projects. Original authors and upstream repositories retain full ownership and intellectual property rights.
- We explicitly credit and link to original sources where applicable. Forked repos maintain their original licenses (typically MIT, GPL, or Apache 2.0).
- Third-party icons, badges, skill icons (from skillicons.dev), and external images are used under fair use/attribution terms and remain property of their respective owners.
- Any contributions, integrations, or add-ons from external sources are included for research, testing, and community convenience only.
This project is licensed under the MIT License – see the LICENSE file for details.
Use responsibly and only on systems you own or have permission to test.
We break things to make them unbreakable.
Built with 💀 and ⚡ by the LEXOLEN team
