CloudBrute – Awesome Cloud Enumerator
A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,...
A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,...
Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main...
A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only....
XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template...
Analyse binaries for missing security features, information disclosure and more. Extrude is in the early stages of development, and currently...
A proof-of-concept User-Defined Reflective Loader (UDRL) which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! Contributors: Contributor Twitter...
Shell command obfuscation to avoid SIEM/detection system During pentest, an important aspect is to be stealth. For this reason you...
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These...
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to...
sttr is command line software that allows you to quickly run various transformation operations on the string. // With input...
Pip-Intel is a powerful tool designed for OSINT (Open Source Intelligence) and cyber intelligence gathering activities. It consolidates various open-source...
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating...
A utility for identifying web page inputs and conducting XSS scanning. Features: Subdomain Discovery: Retrieves relevant subdomains for the target...
A tool to generate a wordlist from the information present in LDAP, in order to crack non-random passwords of domain...
Install To install headerpwn, run the following command: go install github.com/devanshbatham/[email protected] Usage headerpwn allows you to test various headers on...
SherlockChain is a powerful smart contract analysis framework that combines the capabilities of the renowned Slither tool with advanced AI-powered...
Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power...
EvilSlackbot A Slack Attack Framework for conducting Red Team and phishing exercises within Slack workspaces. Disclaimer This tool is intended...
Howdy! My name is Harrison Richardson, or rs0n (arson) when I want to feel cooler than I really am. The...
Reaper is a proof-of-concept designed to exploit BYOVD (Bring Your Own Vulnerable Driver) driver vulnerability. This malicious technique involves inserting...
ROPDump is a tool for analyzing binary executables to identify potential Return-Oriented Programming (ROP) gadgets, as well as detecting potential...
This is a simple SBOM utility which aims to provide an insider view on which packages are getting executed. The...
Tags: Aspx, Encryption, Entropy, Hashes, Malware, Obfuscation, PowerShell, Processes, Scan, Scanning, Scripts, Toolbox, ShellSweepShellSweep - ShellSweeping the evil.Shellsweep - Shellsweeping...
Retrieve and display information about active user sessions on remote computers. No admin privileges required. The tool leverages the remote...