Hades-C2 – Hades Basic Command And Control Server
Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan...
Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan...
Crawlector (the name Crawlector is a combination of Crawler & Detector) is a threat hunting framework designed for scanning websites...
Welcome to CryptChat - where conversations remain truly private. Built on the robust Python ecosystem, our application ensures that every...
Afuzz is an automated web path fuzzing tool for the Bug Bounty projects. Afuzz is being actively developed by @rapiddns...
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system...
Double Venom (DVenom) is a tool that helps red teamers bypass AVs by providing an encryption wrapper and loader for...
Elevation Station Stealing and Duplicating SYSTEM tokens for fun & profit! We duplicate things, make twin copies, and then ride...
A cutting-edge utility designed exclusively for web security aficionados, penetration testers, and system administrators. WebSecProbe is your advanced toolkit for...
The Network Compromise Assessment Tool is designed to analyze pcap files to detect potential suspicious network traffic. This tool focuses...
TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the...
The purpose of the project is to create rate limit in AWS WaF based on HTTP headers.Golang is a dependencie...
TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files. It provides insights into...
Simple Latest CVE Collector Written in Python There are various methods for collecting the latest CVE (Common Vulnerabilities and Exposures)...
Rapidly host payloads and post-exploitation bins over HTTP or HTTPS. Designed to be used on exams like OSCP / PNPT...
PoC for dumping and decrypting cookies in the latest version of Microsoft Teams extract.py just dumps without arguments extract.exe is...
A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates. IF you are interested in seing all...
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later...
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit...
" dir="auto"><script type="text/javascript" src="MailChecker/platform/javascript/MailChecker.js"></script><script type="text/javascript">if(!MailChecker.isValid('[email protected]')){ console.error('O RLY !');}if(!MailChecker.isValid('myemail.com')){ console.error('O RLY !');}</script> PHP include __DIR__."/MailChecker/platform/php/MailChecker.php";if(!MailChecker::isValid('[email protected]')){ die('O RLY !');}if(!MailChecker::isValid('myemail.com')){ die('O RLY !');}...
Arsenal is just a quick inventory, reminder and launcher for pentest commands. This project written by pentesters for pentesters simplify...
Web Path Finder is a Python program that provides information about a website. It retrieves various details such as page...
Puncia utilizes two of our intelligent APIs - Subdomain Center & Exploit Observer, to gather the results. Please note that...
Facad1ng is an open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using...
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments....