ByeIntegrity-UAC – Bypass UAC By Hijacking A DLL Located In The Native Image Cache
Bypass User Account Control (UAC) to gain elevated (Administrator) privileges to run any program at a high integrity level. RequirementsAdministrator account...
Bypass User Account Control (UAC) to gain elevated (Administrator) privileges to run any program at a high integrity level. RequirementsAdministrator account...
APSoft Webscanner Version 2new version of APSoft Webscanner Version 1Software picturesWhat can i do with this ?with this software, you...
TL;DRDuring this RedTeam testing, Hexway team used Clubhouse as a social engineering tool to find out more about their client’s...
The network telemetry engine for data-driven security investigations. Getting Started — Installation — Documentation — Development — Changelog — License...
A tool for exploring and exploiting Firebase datastores.Set upgit clone https://github.com/iosiro/baserunner.git cd baserunner npm install npm run build npm start...
A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors...
CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network...
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build...
Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout. Usage...
For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective...
Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance to find security misconfigurations using...
WordPress Brute Force Super Fast Login .---. .----------- / __ / ------ / / ( )/ ----- ////// ' /...
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect...
Features:Scan a mounted filesystem for threats right away Or gather a system baseline before an incident, for extra threat hunting...
The idea is to "translate" Windows OS privileges to a path leading to: administrator, integrity and/or confidentiality threat, availability threat,...
Introduction to KubeArmorKubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access,...
For complete documentation visit www.botkube.io BotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug...
Pystinger implements SOCK4 proxy and port mapping through webshell. It can be directly used by metasploit-framework, viper, cobalt strike for...
Advanced Fuzzing Library - Slot your own fuzzers together and extend their features using Rust. LibAFL is written and maintained...
The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be...
virtual chunks, then each one is tested against next chunks. So complexity is equal to th triangle number: Throubleshotting If...
The WinPmem memory acquisition driver and userspaceWinPmem has been the default open source memory acquisition driver for windows for a...
Tool Social Engineering (Access Webcam, Microphone, OS Password Grabber And Location Finder) With NgrokFeatures:Get Device Information Without Any Permissions Access...
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.Install:cd /optgit clone https://github.com/stark0de/nginxpwnercd nginxpwnerchmod +x install.sh./install.sh Usage:Target...