Kerberoast – Kerberoast Attack -Pure Python-
Kerberos attack toolkit -pure python- Install pip3 install kerberoast Prereqirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted...
Kerberos attack toolkit -pure python- Install pip3 install kerberoast Prereqirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted...
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain...
Netcat like reverse shell for Linux & Windows. Features WindowsUsage:└ Shared Commands: !exit !upload <src> <dst> * uploads a file...
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then...
Kit Hunter: A basic phishing kit detection tool Version 2.6.0 28 September 2021 Testing and development took place on Python...
Features of Repository =================== Hands-on Download Digital-Forensics-Lab If you like the site, please consider joining the telegram channel or supporting...
My experiments in weaponizing Rust for implant development and general offensive operations. Why Rust? It is faster than languages like...
DetectionLabELK is a fork from Chris Long's DetectionLab with ELK stack instead of Splunk.Description: DetectionLabELK is the perfect lab to...
>_ Introduction 4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same. NOTE :...
Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust (more...
FakeDataGen is a Full Valid Fake Data Generator.This tool helps you to create fake accounts (in Spanish format) with fully...
ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed...
The recommended module is o365 for SearchEngineThis module should be used to retrieve a list of email addresses before validating...
Web Service write in Python for control and protect your android device remotely. The official app can be found on the...
PyQT app to list all Download LOLBins If you like the site, please consider joining the telegram channel or supporting...
RedHerd is a collaborative and DisclaimerThe provided contents and tools are for awareness and research purposes only. Our target audience...
A Wait-For-Exec ModeFor statically linked container runtimes, whoc comes in another flavor: whoc:waitforexec.upload_runtime is the image entrypoint, and runs as...
"My little birds are everywhere, even in the North, they whisper to me the strangest stories." - Lord VarysWhispers is...
UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top of UDP, the...
ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started...
Program uses Thread Usageint main(){ System sys; Interceptor incp; Exception exp; sys.returnVersionState(); if (sys.returnPrivilegeEscalationState()) { std::cout << "Token Privileges Adjustedn";...
Static Token And Credential ScannerWhat is it?STACS is a The performance is really, really bad when running in Docker on...
A Replace your IP Address and Port on above commands.Running ServerThe server must be executed on Linux. You can buy...
Cobalt Strike How does this work?Primarily, using Cobalt Strike's breg_query and breg_queryv functions. Then, all beacon output is hijacked with...