EmploLeaks – An OSINT Tool That Helps Detect Members Of A Company With Leaked Credentials
This is a tool designed for Open Source Intelligence (OSINT) purposes, which helps to gather information about employees of...
This is a tool designed for Open Source Intelligence (OSINT) purposes, which helps to gather information about employees of...
Bugsy is a command-line interface (CLI) tool that provides automatic security vulnerability remediation for your code. It is the community...
WebCopilot is an automation tool designed to enumerate subdomains of the target and detect bugs using different open-source tools. The...
A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers...
CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester....
Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the...
Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for...
Demonized Shell is an Advanced Tool for persistence in linux. Install git clone https://github.com/MatheuZSecurity/D3m0n1z3dShell.gitcd D3m0n1z3dShellchmod +x demonizedshell.shsudo ./demonizedshell.sh One-Liner Install...
PhantomCrawler allows users to simulate website interactions through different proxy IP addresses. It leverages Python, requests, and BeautifulSoup to offer...
Overview RansomwareSim is a simulated ransomware application developed for educational and training purposes. It is designed to demonstrate how ransomware...
Have you ever watched a film where a hacker would plug-in, seemingly ordinary, USB drive into a victim's computer and...
KnowsMore officially supports Python 3.8+. Main features Import NTLM Hashes from .ntds output txt file (generated by CrackMapExec or secretsdump.py)...
A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors. About Thank you to @albinowax, @defparam and @d3d else this...
Little AV/EDR Evasion Lab for training & learning purposes. (️ under construction..) ____ _ _____ ____ ____ ___ __ _____...
A variation of ProcessOverwriting to execute shellcode on an executable's section What is it For a more detailed explanation you...
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only)....
MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with...
Pantheon is a GUI application that allows users to display information regarding network cameras in various countries as well as...
Like its Windows counterpart, Winpmem, this is not a traditional memory dumper. Linpmem offers an API for reading from any...
A GUI tool for viewing Windows Named Pipes and searching for insecure permissions. The tool was published as part of...
PySQLRecon is a Python port of the awesome SQLRecon project by @sanjivkawa. See the commands section for a list of...
MacMaster is a versatile command line tool designed to change the MAC address of network interfaces on your system. It...
NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced...
Reverse shell that can bypass windows defender detection $ apt install nim Compilation nim c -d:mingw --app:gui nimshell.nim Change the...