Nidhogg – All-In-One Simple To Use Rootkit For Red Teams
Nidhogg is a multi-functional rootkit for red teams. The goal of Nidhogg is to provide an all-in-one and easy-to-use rootkit...
Nidhogg is a multi-functional rootkit for red teams. The goal of Nidhogg is to provide an all-in-one and easy-to-use rootkit...
A GPT-empowered penetration testing tool. Common Questions Q: What is PentestGPT? A: PentestGPT is a penetration testing tool empowered by...
rebindMultiA is a tool to perform a Multiple A Record rebind attack. rebindmultia.com is a domain that I've set up...
bootlicker is a legacy, extensible UEFI firmware rootkit targeting vmware hypervisor virtual machines. It is designed to achieve initial code...
UEFI and SMM Assessment Tool Features Platbox is a tool that helps assessing the security of the platform: Dumps the...
Easy to use PowerShell script to enumerate access permissions in an Azure Active Directory environment. Background details can be found...
Based on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of...
Simple script to generate graphs and charts on hashcat (and john) potfile and ntds Install git clone https://github.com/Orange-Cyberdefense/graphcatcd graphcatpip install...
Acheron is a library inspired by SysWhisper3/FreshyCalls/RecycledGate, with most of the functionality implemented in Go assembly. acheron package can be...
Hades is a proof of concept loader that combines several evasion technques with the aim of bypassing the defensive mechanisms...
Note: This is a work-in-progress prototype, please treat it as such. Pull requests are welcome! You can get your feet...
A simple script just made for self use for bypassing 403 It can also be used to compare responses on...
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities Account...
WAFARAY is a LAB deployment based on Debian 11.3.0 (stable) x64 made and cooked between two main ingredients WAF +...
This tool is a simple PoC of how to hide memory artifacts using a ROP chain in combination with hardware...
Penetration tests on SSH servers using dictionary attacks. Written in C. brute krag means "brute force" in afrikáans Disclaimer This...
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other...
This is a command-line tool written in Python that applies one or more transmutation rules to a given password or...
Written by TMRSWRR Version 1.0.0 All in one tools for LFI VULN FINDER -LFI DORK FINDER Instagram: TMRSWRR Screenshots How...
TLDHunt is a command-line tool designed to help users find available domain names for their online projects or businesses. By...
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files. Done Related domains, IPs collect...
An advance cross-platform and multi-feature GUI web spider/crawler for cyber security proffesionals. Spider Suite can be used for attack surface...
OWASP Global AppSec Dublin - talk and demo Features scan Amazon Route53 across an AWS Organization for domain records vulnerable...
About Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It's written in...