AnonX – An Encrypted File Transfer Via AES-256-CBC
An Encrypted File transfer via AES-256-CBC AnonX is an encrypted file uploader and downloader. The uploaded archive lasts for one...
An Encrypted File transfer via AES-256-CBC AnonX is an encrypted file uploader and downloader. The uploaded archive lasts for one...
Elasticsearch infections are rising exponentially. The adversaries are exploiting open and exposed Elasticsearch interfaces to trigger infections in the cloud...
Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. It's intended...
Script For AutomRDPatic Scanning And Brute-Force.Demo Video: Lazy-RDP over SSH: Script for automatic scanning of the address list for the...
SnitchDNS is a database driven DNS Server with a Web UI, written in Python and Twisted, that makes DNS administration...
Powerful Telegram Members Scraping and Adding Toolkit FeaturesADDS IN BULK Scrapes and adds to public groups Works in Windows systems...
A tool for checking for lingering free namespaces for private package names referenced in dependency configuration for Python (pypi) requirements.txt,...
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents...
I've wrote this program as a proof of concept to test the idea of be able to send tcp stream...
Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline This tool is available when...
The next step after compromising a machine is to enumerate the network behind. Many tools exist to expose a socks...
WriteHat is a reporting tool which removes Microsoft Word (and many hours of suffering) from the reporting process. Markdown -->...
HiddenEye: Reborn is my second try on doing multi-featured tool for human mistakes exploitation. Currently, HE: RE has mainly phishing...
Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerabilty and it...
A bash script that automates the exfiltration of data over dns in case we have a blind command execution on...
packetStrider for SSH is a packet forensics tool that aims to provide valuable insight into the nature of SSH traffic,...
Customizable honeypots for monitoring network traffic, bots activities and usernamepassword credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP,...
uEmu is a tiny cute emulator plugin for IDA based on unicorn engine. Supports following architectures out of the box:...
Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are...
In Bugbounties “If you are not first , then you are last” there is no such thing as silver or...
PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic. It can encrypt/decrypt beacon metadata, as well...
SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter....
Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a...
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat...