BlueBunny – BLE Based C2 For Hak5’s Bash Bunny
C2 solution that communicates directly over Bluetooth-Low-Energy with your Bash Bunny Mark II.Send your Bash Bunny all the instructions it...
C2 solution that communicates directly over Bluetooth-Low-Energy with your Bash Bunny Mark II.Send your Bash Bunny all the instructions it...
PassBreaker is a command-line password cracking tool developed in Python. It allows you to perform various password cracking techniques such...
Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose...
C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It...
Basically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes...
T3SF is a framework that offers a modular structure for the orchestration of events based on a master scenario events...
Aladdin is a payload generation technique based on the work of James Forshaw (@tiraniddo) that allows the deseriallization of a...
WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries...
Hidden Desktop (often referred to as HVNC) is a tool that allows operators to interact with a remote desktop session...
A Linux persistence tool! A powerful and versatile Linux persistence script designed for various security assessment and testing scenarios. This...
MaccaroniC2 is a proof-of-concept Command and Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client...
Mass bruteforce network protocols Info Simple personal script to quickly mass bruteforce common services in a large scale of network....
OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT...
Service that scans your Infrastructure as Code for common vulnerabilities. Aspect Information Tool name IaC Scan Runner Docker image xscanner/runner...
Microsoft ICS Forensics Tools is an open source forensic framework for analyzing Industrial PLC metadata and project files. it enables...
Yet another tool - why? Existing tools don't really "understand" code. Instead, they mostly parse texts. DeepSecrets expands classic regex-search...
Clean up of over permissioned IAM accounts on GCP infra in an automated way CureIAM is an easy-to-use, reliable, and...
MemTracer is a tool that offers live memory analysis capabilities, allowing digital forensic practitioners to discover and investigate stealthy attack...
LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done...
BREAD (BIOS Reverse Engineering & Advanced Debugging) is an 'injectable' real-mode x86 debugger that can debug arbitrary real-mode code (on...
LTESniffer is An Open-source LTE Downlink/Uplink Eavesdropper It first decodes the Physical Downlink Control Channel (PDCCH) to obtain the Downlink...
padre is an advanced exploiter for Padding Oracle attacks against CBC mode encryption Features: blazing fast, concurrent implementation decryption of...
Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in...
Forbidden Buster is a tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes...