HTTPUploadExfil – A Simple HTTP Server For Exfiltrating Files/Data During, For Example, CTFs
HTTPUploadExfil is a (very) simple HTTP server written in Go that's useful for getting files (and other information) off a...
HTTPUploadExfil is a (very) simple HTTP server written in Go that's useful for getting files (and other information) off a...
Dumping revelant information on compromised targets without AV detection DPAPI dumpingLots of credentials are protected by DPAPI. We aim at...
Download Clash If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST MethodsNOTELorsrf has been added to scant3r with useful...
This webapp is a browser and desktop password manager compatible with KeePass databases. It doesn't require any server or additional...
The purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools...
VECTR documentation can be found here: DocumentationFeature Breakdowns By ReleaseVECTR v7.1.1 Feature BreakdownTeamLEAD PROGRAMMERS:Carl VonderheidGalen FisherDaniel HongPROGRAMMERS:Andrew ScottPatrick HislopDan GuzekZara...
A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based...
OSINT Tool On Twitter And Instagram. Basic Usage:~/terra$ python3 terra.py <username of target> help : -j for saving results in a...
This repository hosts the documentation and issue tracker for all SysFlow projects.Quick referenceDocumentation:the SysFlow DocumentationWhere to get help:the SysFlow Community...
SubCrawl is a framework developed by However, if this UI is not sufficient for the subsequent evaluation of the data,...
PortBender is a TCP port redirection utility that allows a red team operator to redirect inbound traffic destined for one...
Basic TutorialHere you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.These tools search for possible local privilege...
NTFSTool is a forensic tool focused on NTFS volumes. It supports reading partition info (mbr, partition table, vbr) but also...
Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).MetabadgerPurpose and functionalityDiagnose...
A tool which creates a spoof code signing to sign a file with a valid code signing certificate use the...
LazyCSRF is a more useful CSRF PoC InstallationDownload the jar from LICENSEMIT LicenseCopyright (C) 2021 tkmruDownload lazyCSRF If you like...
𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is a Passive Open Source MODEsMODEExamples-ip bash karma_v2 -d <DOMAIN.TLD> -l <INTEGER> -ip-asn bash karma_v2 -d <DOMAIN.TLD> -l...
Modern Penetration testing and Red Teaming often requires to bypass common AV/EDR appliances in order to execute code on a...
C# based tool which automates the process of discovering and 4. Examples:Target Executable: OneDrive.exeStage: DiscoveryStage: ExploitationSuccessful DLL Hijacks: Unsuccessful DLL Hijacks: DLL...
FaPro is a Fake Protocol Server tool, Can easily start or stop multiple network services.The goal is to support as...
dokrscout is a tool to automate the finding of Install wordliststo start scanning you'll need some dork lists and to...
Protect Against Subdomain Takeoverscans Amazon Route53 across an AWS Organization for domain records vulnerable to takeovervulnerable domains in Google Cloud...
A simple pure-Python network packet sniffer. Packets are disassembled as they arrive at a given network interface controller and their...