Golddigger – Search Files For Gold
Gold Digger is a simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist...
Gold Digger is a simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist...
ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate targeted wordlists that can be...
Introducing SOC Multi-tool, a free and open-source browser extension that makes investigations faster and more efficient. Now available on the...
Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of...
Introduction BugChecker is a SoftICE-like kernel and user debugger for Windows 11 (and Windows XP as well: it supports Windows...
Polaris is an open source policy engine for Kubernetes Polaris is an open source policy engine for Kubernetes that validates...
A pure python library for identifying the use of known or very weak cryptographic secrets across a variety of platforms....
A cross-platform, collaborative, Command & Control framework written in C#, designed for red teaming and ease of use. HardHat is...
ReconAIzer is a powerful Jython extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon...
Gato, or GitHub Attack Toolkit, is an enumeration and attack tool that allows both blue teamers and offensive security practitioners...
msLDAPDump simplifies LDAP enumeration in a domain environment by wrapping the lpap3 library from Python in an easy-to-use interface. Like...
certsync is a new technique in order to dump NTDS remotely, but this time without DRSUAPI: it uses golden certificate...
EndExt is a .go tool for extracting all the possible endpoints from the JS files Idea When you crawll all...
This tools is very helpful for finding vulnerabilities present in the Web Applications. A web application scanner explores a web...
Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system...
These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events...
Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And...
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing...
The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin. Usage The BackupOperatorToolkit (BOT) has...
It's a AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Features: Module...
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the...
C2-Hunter C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time....
burpgpt leverages the power of AI to detect security vulnerabilities that traditional scanners might miss. It sends web traffic to...
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether...