PurpleOps – An Open-Source Self-Hosted Purple Team Management Web Application
An open-source self-hosted purple team management web application. Key Features Template engagements and testcases Framework friendly Role-based Access Control &...
An open-source self-hosted purple team management web application. Key Features Template engagements and testcases Framework friendly Role-based Access Control &...
The Next-gen Encryption Try temcrypt on the Web → temcrypt SDK Focused on protecting highly sensitive data, temcrypt is an...
Noir is an attack surface detector form source code. Key Features Automatically identify language and framework from source code. Find...
DNSWatch is a Python-based tool that allows you to sniff and analyze DNS (Domain Name System) traffic on your network....
Poastal is an email OSINT tool that provides valuable information on any email address. With Poastal, you can easily input...
Holehe Online Version Summary Efficiently finding registered accounts from emails. Holehe checks if an email is attached to an account...
Toolkit demonstrating another approach of a QRLJacking attack, allowing to perform remote account takeover, through sign-in QR code phishing. It...
Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be...
MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The...
HEDnsExtractor Raw html extractor from Hurricane Electric portal Features Automatically identify IPAddr ou Networks through command line parameter or stdin...
xsubfind3r is a command-line interface (CLI) utility to find domain's known subdomains from curated passive online sources. Features Fetches domains...
NETWORK Pcap File Analysis, It was developed to speed up the processes of SOC Analysts during analysis Tested OK DebianOK...
xcrawl3r is a command-line interface (CLI) utility to recursively crawl webpages i.e systematically browse webpages' URLs and follow links to...
A .NET malware loader, using API-Hashing and dynamic invoking to evade static analysis How does it work? NixImports uses my...
chaos is an 'origin' IP scanner developed by RST in collaboration with ChatGPT. It is a niche utility with an...
Columbus Project is an API first subdomain discovery service, blazingly fast subdomain enumeration service with advanced features. Columbus returned 638...
Welcome to HackBot, an AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also...
This project was built by pentesters for pentesters. Redeye is a tool intended to help you manage your data during...
While DLL sideloading can be used for legitimate purposes, such as loading necessary libraries for a program to function, it...
Dredging Windows for Persistence What is it? Trawler is a PowerShell script designed to help Incident Responders discover potential indicators...
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later...
AWS workloads that rely on the metadata endpoint are vulnerable to Server-Side Request Forgery (SSRF) attacks. IMDShift automates the migration...
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. PrivKit detects...
This POC is inspired by James Forshaw (@tiraniddo) shared at BlackHat USA 2022 titled “Taking Kerberos To The Next Level...