SharpRDP – Remote Desktop Protocol .NET Console Application For Authenticated Command Execution
To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release...
To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release...
Ghost Framework is an Android post exploitation framework that uses anAndroid Debug Bridge to remotely access an Android device. Ghost...
This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker...
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is...
This post describes CVE-2019-5648, a vulnerability in the Barracuda Load Balancer ADC. A malicious actor who gains authenticated, administrative access...
This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...
Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...
About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...
All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...
WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This...
If you joined Rapid7 at RSAC 2020 just a few days ago, you probably caught wind of Rapid7’s end-of-year threat...
DNS Rebinding freamwork containing:a dns server obviouslyweb api to create new subdomains and control the dns server, view logs, stuff...
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the...
This blog was co-authored by Mark Hamill and Bob Rudis.There’s nothing quite like attending the annual RSA security conference in...
Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it...
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a...
This tool search for SSRF using predefined settings in different parts of a request (path, host, headers, post and get...
The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the...
PolyShell is a script that's simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot).This makes PolyShell a useful...
About Mouse FrameworkMouse Framework is an iOS and macOS post exploitation surveillance framework that gives you a command line session...
Running CTFs and Security Trainings with OWASP Juice Shop is usually quite tricky, Juice Shop just isn't intended to be...
Burp Suite extension to track vulnerability assessment progress.Features Capture items (unique requests) from the Burp Suite tools (Proxy, Repeater, Target)....
One prominent area where security programs often struggle is when the security team must demonstrate the business outcomes achieved for...
Advanced Binary DeobfuscationThis repository contains the course materials of Advanced Binary Deobfuscation at the Global Cybersecurity Camp (GCC) Tokyo in...