Nysm – A Stealth Post-Exploitation Container
A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers...
A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers...
CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester....
Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the...
Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for...
Demonized Shell is an Advanced Tool for persistence in linux. Install git clone https://github.com/MatheuZSecurity/D3m0n1z3dShell.gitcd D3m0n1z3dShellchmod +x demonizedshell.shsudo ./demonizedshell.sh One-Liner Install...
PhantomCrawler allows users to simulate website interactions through different proxy IP addresses. It leverages Python, requests, and BeautifulSoup to offer...
Overview RansomwareSim is a simulated ransomware application developed for educational and training purposes. It is designed to demonstrate how ransomware...
Have you ever watched a film where a hacker would plug-in, seemingly ordinary, USB drive into a victim's computer and...
KnowsMore officially supports Python 3.8+. Main features Import NTLM Hashes from .ntds output txt file (generated by CrackMapExec or secretsdump.py)...
A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors. About Thank you to @albinowax, @defparam and @d3d else this...
Pantheon is a GUI application that allows users to display information regarding network cameras in various countries as well as...
Little AV/EDR Evasion Lab for training & learning purposes. (️ under construction..) ____ _ _____ ____ ____ ___ __ _____...
A variation of ProcessOverwriting to execute shellcode on an executable's section What is it For a more detailed explanation you...
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only)....
MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with...
Like its Windows counterpart, Winpmem, this is not a traditional memory dumper. Linpmem offers an API for reading from any...
A GUI tool for viewing Windows Named Pipes and searching for insecure permissions. The tool was published as part of...
PySQLRecon is a Python port of the awesome SQLRecon project by @sanjivkawa. See the commands section for a list of...
MacMaster is a versatile command line tool designed to change the MAC address of network interfaces on your system. It...
NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced...
Reverse shell that can bypass windows defender detection $ apt install nim Compilation nim c -d:mingw --app:gui nimshell.nim Change the...
APIDetector is a powerful and efficient tool designed for testing exposed Swagger endpoints in various subdomains with unique smart capabilities...
OSX Password Dumper Script Overview A bash script to retrieve user's .plist files on a macOS system and...
Telegram Nearby Map uses OpenStreetMap and the official Telegram library to find the position of nearby users. Please note: Telegram's...