SpyCast – A Crossplatform mDNS Enumeration Tool
SpyCast is a crossplatform mDNS enumeration tool that can work either in active mode by recursively querying services, or in...
SpyCast is a crossplatform mDNS enumeration tool that can work either in active mode by recursively querying services, or in...
psudohash is a password list The script includes a basic character substitution schema. You can add/modify character substitution patterns by...
What is scan4all: integrated vscan, nuclei, ksubdomain, subfinder, etc., fully automated and intelligent。red team tools Code-level optimization, parameter optimization, and...
Unoffical Flipper Zero cli wrapper written in PythonFunctions and characteristics: Flipper serial CLI wrapper Websocket client interfaceSetup instructions:$ git clone...
This project is a C# tool to use Pass-the-Hash for authentication on a local Named Pipe for user Impersonation. You...
PSAsyncShell is an Asynchronous TCP Reverse Shell written in pure PowerShell.Unlike other reverse shells, all the communication and execution flow...
Exploit padding oracles for fun and profit!Pax (PAdding oracle eXploiter) is a tool for exploiting padding oracles in order to:Obtain...
SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities. The...
OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. It will also work on...
Kam1n0 v2.x is a scalable assembly management and analysis platform. It allows a user to first index a (large) collection...
REST API fuzzer and negative testing tool. Run thousands of self-healing API tests within minutes with no coding effort!Comprehensive: tests...
Frequency Independent SDR-based Signal Understanding and Reverse EngineeringFISSURE is an open-source RF and reverse engineering framework designed for all skill...
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing...
With Microsoft's recent announcement regarding the blocking of macros in documents originating from the internet (email AND web download), attackers...
This was a learning by doing project from my side. Well known techniques are used to built just another impersonation...
_____ ____ ____ _ / ___// __ ____ ____ ___ / __ (_)_____________ _ _____ _____ __ / / /...
PersistenceSniper is a Powershell script that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences...
A Nim implementation of reflective PE-Loading from memory. The base for this code was taken from RunPE-In-Memory - which I...
Graph Crawler is the most powerful automated testing toolkit for any GraphQL endpoint.NEW: Can search for endpoints for you using...
Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption.Obfuscation ModesSession Cookie HTTP GET (http-client)Set-Cookie Session Cookie HTTP/2...
ForceAdmin is a c# payload builder, creating infinate UAC pop-ups until the user allows the program to be ran. The...
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods. FeaturesAutomatically detects...
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user Changed from sam-the-admin. Usage SAM THE ADMIN CVE-2021-42278 +...
BeatRev Version 2Disclaimer/LiabilityThe work that follows is a POC to enable malware to "key" itself to a particular victim in...