Power-PWN: A Comprehensive Guide to Offensive and Defensive Security for Microsoft 365
Power-PWN is a sophisticated offensive security toolset designed to test and identify vulnerabilities in Microsoft 365 environments. It supports red...
Power-PWN is a sophisticated offensive security toolset designed to test and identify vulnerabilities in Microsoft 365 environments. It supports red...
When it comes to securing web applications, JavaScript often stands out as one of the more vulnerable components. It runs...
SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall...
secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and it...
BYOSI - Bring-Your-Own-Script-Interpreter - Leveraging the abuse of trusted applications, one is able to deliver a compatible script interpreter for...
file-unpumper is a powerful command-line utility designed to clean and analyze Portable Executable (PE) files. It provides a range of...
The Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic...
Mass Assigner is a powerful tool designed to identify and exploit mass assignment vulnerabilities in web applications. It achieves this...
Mass Assigner is a powerful tool designed to identify and exploit mass assignment vulnerabilities in web applications. It achieves this...
Evade EDR's the simple way, by not touching any of the API's they hook. Theory I've noticed that most EDRs...
Evade EDR's the simple way, by not touching any of the API's they hook. Theory I've noticed that most EDRs...
A make an LKM rootkit visible again. This tool is part of research on LKM rootkits that will be launched....
ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.Another way to make an LKM visible is using the imperius trick: https://github.com/MatheuZSecurity/ImperiusDownload ModTracer...
DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more. What...
Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok...
A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,...
Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main...
A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only....
XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template...
Analyse binaries for missing security features, information disclosure and more. Extrude is in the early stages of development, and currently...
A proof-of-concept User-Defined Reflective Loader (UDRL) which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! Contributors: Contributor Twitter...
Shell command obfuscation to avoid SIEM/detection system During pentest, an important aspect is to be stealth. For this reason you...
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These...
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to...