Go-RouterSocks – Router Sock. One Port Socks For All The Others.
The next step after compromising a machine is to enumerate the network behind. Many tools exist to expose a socks...
The next step after compromising a machine is to enumerate the network behind. Many tools exist to expose a socks...
WriteHat is a reporting tool which removes Microsoft Word (and many hours of suffering) from the reporting process. Markdown -->...
HiddenEye: Reborn is my second try on doing multi-featured tool for human mistakes exploitation. Currently, HE: RE has mainly phishing...
Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerabilty and it...
A bash script that automates the exfiltration of data over dns in case we have a blind command execution on...
packetStrider for SSH is a packet forensics tool that aims to provide valuable insight into the nature of SSH traffic,...
Customizable honeypots for monitoring network traffic, bots activities and usernamepassword credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP,...
uEmu is a tiny cute emulator plugin for IDA based on unicorn engine. Supports following architectures out of the box:...
Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are...
In Bugbounties “If you are not first , then you are last” there is no such thing as silver or...
PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic. It can encrypt/decrypt beacon metadata, as well...
SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter....
Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a...
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat...
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone...
OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner. Note: AWSS is the older name...
Halogen is a tool to automate the creation of yara rules against image files embedded within a malicious document.Halogen helppython3...
StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution...
A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential caching and...
A Forensic Evidence AcquirerCompileAssuming you have Rust 1.41+ installed. Open terminal in the project directory and to compile a release...
Pillager is designed to provide a simple means of leveraging Go's strong concurrency model to recursively search directories for sensitive...
Gatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it...
In warfare, CornerShot is a weapon that allows a soldier to look past a corner (and possibly take a shot),...
An open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol. DisclaimerOpenWifiPass is experimental software and is...