PowerProxy – PowerShell SOCKS Proxy With Reverse Proxy Capabilities
PowerShell SOCKS proxy with reverse proxy capabilities. PowerProxy is written with penetration testers in mind. Reverse proxy functionality is a...
PowerShell SOCKS proxy with reverse proxy capabilities. PowerProxy is written with penetration testers in mind. Reverse proxy functionality is a...
Cyph is a cryptographically secure messaging and social networking service, providing an extreme level of privacy combined with best-in-class ease...
Running httpx on 94K References Lithops documentation Free Tiers Cloud Provider Free Allowance Link Google Functions 2 Million invocations, 400,000...
Grafiki is a Django project about Sysmon and graphs, for the time being. In my opinion EventViewer, Elastic and even...
Verdict-as-a-Service (VaaS) is a service that provides a platform for scanning files for malware and other threats. It allows easy...
Time for another Kali Linux release! – Kali Linux 2022.2. This release has various impressive updates.The summary of the changelog...
BirDuster is a Python based knockoff of the original DirBuster. BirDuster is a multi threaded Python application designed to brute...
Chlonium is an application designed for cloning Chromium Cookies. From Chromium 80 and upwards, cookies are encrypted using AES-256 GCM,...
Features Attack Monitoring Outbound Network Calls Attack Blocking Outbound Network Calls Roadmap Attack Monitoring Command Execution File Calls Attack Blocking...
The BoB Web Application Security Project (BWASP) is an open-source, analysis tool to support for Web Vulnerability Manual Analysis hackers....
Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes. Author: @bohops License: MIT Project:...
Process Overwriting is a PE In memory (via Process Hacker): Clone: Use recursive clone to get the repo together with...
Programmatically create hunting rules for deserialization exploitation with multiple keywords (e.g. cmd.exe) gadget chains (e.g. CommonsCollection) object types (e.g. ViewState,...
This tool is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure...
DuplicateDump is a fork of MirrorDump with following modifications: DInovke implementation LSA plugin DLL written in C++ which could be...
KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and Features Dashboard Fixable vulnerabilities per...
Description of the vulnerability: https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html Construction of the POC: https://github.com/BobTheShoplifter/Spring4Shell-POC Steps to Build/Run Tested with JDK 11.0.14, Spring Boot 2.6.5,...
Run the exploit.py script: python exploit.py --url "http://localhost:8080/helloworld/greeting" Visit the created webshell! Modify the cmd GET parameter for your commands....
What is it? AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the...
If you want to change these URLs to your desired ones, you can simply open the cve.ps1 file with an...
A Swiss Army Knife for Zsh - Unix Shell.RoadmapSee the open issues for a list of proposed features (and known...
Golang reverse/bind shell generator. Description This tool generates a Go binary that launches a shell of the desired type on...
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect...
With the help of this References https://hub.docker.com/r/4d0niis/pezor_included_kali https://github.com/phra/PEzor https://hub.docker.com/r/kalilinux/kali-rolling Download PEzor-Docker If you like the site, please consider joining the...