PersistBOF – Tool To Help Automate Common Persistence Mechanisms
A tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut...
A tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut...
A tool for automatically converting Run the first pass of mitmproxy2swagger: $ mitmproxy2swagger -i <path_to_mitmptoxy_flow> -o <path_to_output_schema> -p <api_prefix> Please...
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing WAFs and other reverse proxies. How does...
BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a...
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers. TURN is a protocol mostly...
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality...
The goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware. This...
pocsploit is a lightweight, flexible and novel open source poc verification framework Pain points of the POC framework in the...
FindFunc is an IDA Pro plugin to find code functions that contain a certain assembly or byte pattern, reference a...
A tool that helps you can easy using frida. It support script for trace classes, functions, and modify the return...
A machine learning malware analysis framework for Android apps. DroidDetective is a Python tool for analysing Android applications (APKs) for...
anonymously reverse shell over onion network using If you are having any operating system compatiblity issue, let me know. I...
Reposaur is the open source compliance tool for development platforms. Audit, verify and report on your data and configurations easily...
pip3 install frelatageCurrent release : Frelatage is a coverage-based Python fuzzing library which can be used to fuzz python code....
FindWall is Python script that allows to understand if your network provider is limiting your access to the Internet by...
Commonly used tools for Red Teaming Engagements, Physical Security Assessments, and Tactical Covert Entry. In this list I decided to...
OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited. Getting started: Install...
DISCLAIMER This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in...
Tetanus is a Windows and Linux C2 agent written in rust. Installation To install Tetanus, you will need Mythic set...
Xepor (pronounced /ˈzɛfə/, zephyr), a web routing framework for reverse engineers and security researchers. It provides a Flask-like API for...
Octopus is an open source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP/S....
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. Installation chmod u+x...
PowerShell SOCKS proxy with reverse proxy capabilities. PowerProxy is written with penetration testers in mind. Reverse proxy functionality is a...
Cyph is a cryptographically secure messaging and social networking service, providing an extreme level of privacy combined with best-in-class ease...