Domain-Protect – Protect Against Subdomain Takeover
Protect Against Subdomain Takeoverscans Amazon Route53 across an AWS Organization for domain records vulnerable to takeovervulnerable domains in Google Cloud...
Protect Against Subdomain Takeoverscans Amazon Route53 across an AWS Organization for domain records vulnerable to takeovervulnerable domains in Google Cloud...
A simple pure-Python network packet sniffer. Packets are disassembled as they arrive at a given network interface controller and their...
crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole...
NetworKit is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of...
ForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for...
XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and...
Unmanaged PowerShell execution using DLLs or a standalone executable. IntroductionPowerShx is a rewrite and expansion on the PowerShdll project. PowerShx...
rdesktop is an open source client for Microsoft's RDP protocol. It is known to work with Windows versions ranging from...
Shisho is a lightweight Try at PlaygroundYou can try Shisho at our playground. Try with DockerYou can try shisho in...
Linux CatScale is a bash script that uses live of the land tools to collect extensive data from Linux based...
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE...
A dead simple library providing the foundational logic for efficient password brute force attacks against authentication interfaces. See various Wiki...
FUSE is a penetration testing system designed to identify Unrestricted Executable File Upload (UEFU) vulnerabilities. The details of the testing...
This tool allows you to statically analyze Windows, Linux, OSX executables and APK files.You can get:What DLL files are used.Functions...
GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by...
AF-ShellHunter: Auto shell lookupAF-ShellHunter its a script designed to automate the search of WebShell's in AF TeamHow topip3 install -r...
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process...
A program to control systems remotely by uploading videos to Youtube using Python to create the videos and the listener,...
ASF aims to protect organizations acting as an attack surface watchdog, provided an “Object” which might be a: Domain, IP...
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.SummarySpoolSploit is a collection of Windows print...
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport.Preview front...
VERSION 3.6Code efficiency enhancements and bug fixes for plugins, and improved logging.Significant UI/UX enhancements.Organisation specific settings and configurations, allowing for...
pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web...
CARPUNK IS VERY SIMILAR TO CANghost, ONLY THE DEFFERENCE IS, IT COMES WITH OPTIONS TO ENABLE OR DISABLE INTERFACE AND...