Certsync – Dump NTDS With Golden Certificates And UnPAC The Hash
certsync is a new technique in order to dump NTDS remotely, but this time without DRSUAPI: it uses golden certificate...
certsync is a new technique in order to dump NTDS remotely, but this time without DRSUAPI: it uses golden certificate...
EndExt is a .go tool for extracting all the possible endpoints from the JS files Idea When you crawll all...
This tools is very helpful for finding vulnerabilities present in the Web Applications. A web application scanner explores a web...
Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system...
These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events...
Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And...
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing...
The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin. Usage The BackupOperatorToolkit (BOT) has...
It's a AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Features: Module...
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the...
C2-Hunter C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time....
burpgpt leverages the power of AI to detect security vulnerabilities that traditional scanners might miss. It sends web traffic to...
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether...
"Python memory module" AI generated pic - hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe...
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. This tool is...
A DLL Loader With Advanced Evasive Features Features: CRT library independent. The final DLL file, can run the payload by...
Python 3 script to dump company employees from LinkedIn APIï’¬ Description LinkedInDumper is a Python 3 script that dumps employee...
Kubestroyer Kubestroyer aims to exploit Kubernetes clusters misconfigurations and be the swiss army knife of your Kubernetes pentests About The...
This multi operating system compatible tool was created to leverage Discord's voice channels for command and control operations. This tool...
MAAD-AF is an open-source cloud attack tool developed for testing security of Microsoft 365 & Azure AD environments through adversary...
It's a Burp Suite's extension to allow for recursive crawling and scanning of Single Page Applications. It runs a Chromium...
A GPT-empowered penetration testing tool. Common Questions Q: What is PentestGPT? A: PentestGPT is a penetration testing tool empowered by...
rebindMultiA is a tool to perform a Multiple A Record rebind attack. rebindmultia.com is a domain that I've set up...
EntropyReducer: Reduce The Entropy Of Youre Payload And Obfuscate It With Serialized Linked Lists How Does It Work EntropyReducer algorithm...