Noir – An Attack Surface Detector Form Source Code
Noir is an attack surface detector form source code. Key Features Automatically identify language and framework from source code. Find...
Noir is an attack surface detector form source code. Key Features Automatically identify language and framework from source code. Find...
DNSWatch is a Python-based tool that allows you to sniff and analyze DNS (Domain Name System) traffic on your network....
Poastal is an email OSINT tool that provides valuable information on any email address. With Poastal, you can easily input...
Holehe Online Version Summary Efficiently finding registered accounts from emails. Holehe checks if an email is attached to an account...
Toolkit demonstrating another approach of a QRLJacking attack, allowing to perform remote account takeover, through sign-in QR code phishing. It...
Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be...
MSSqlPwner is an advanced and versatile pentesting tool designed to seamlessly interact with MSSQL servers and based on Impacket. The...
HEDnsExtractor Raw html extractor from Hurricane Electric portal Features Automatically identify IPAddr ou Networks through command line parameter or stdin...
xsubfind3r is a command-line interface (CLI) utility to find domain's known subdomains from curated passive online sources. Features Fetches domains...
NETWORK Pcap File Analysis, It was developed to speed up the processes of SOC Analysts during analysis Tested OK DebianOK...
Columbus Project is an API first subdomain discovery service, blazingly fast subdomain enumeration service with advanced features. Columbus returned 638...
xcrawl3r is a command-line interface (CLI) utility to recursively crawl webpages i.e systematically browse webpages' URLs and follow links to...
A .NET malware loader, using API-Hashing and dynamic invoking to evade static analysis How does it work? NixImports uses my...
chaos is an 'origin' IP scanner developed by RST in collaboration with ChatGPT. It is a niche utility with an...
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later...
Welcome to HackBot, an AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also...
This project was built by pentesters for pentesters. Redeye is a tool intended to help you manage your data during...
While DLL sideloading can be used for legitimate purposes, such as loading necessary libraries for a program to function, it...
Dredging Windows for Persistence What is it? Trawler is a PowerShell script designed to help Incident Responders discover potential indicators...
AWS workloads that rely on the metadata endpoint are vulnerable to Server-Side Request Forgery (SSRF) attacks. IMDShift automates the migration...
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. PrivKit detects...
This POC is inspired by James Forshaw (@tiraniddo) shared at BlackHat USA 2022 titled “Taking Kerberos To The Next Level...
Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based...
With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded...