Judge-Jury-and-Executable – A File System Forensics Analysis Scanner And Threat Hunting Tool
Features:Scan a mounted filesystem for threats right away Or gather a system baseline before an incident, for extra threat hunting...
Features:Scan a mounted filesystem for threats right away Or gather a system baseline before an incident, for extra threat hunting...
The idea is to "translate" Windows OS privileges to a path leading to: administrator, integrity and/or confidentiality threat, availability threat,...
Introduction to KubeArmorKubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access,...
For complete documentation visit www.botkube.io BotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug...
Pystinger implements SOCK4 proxy and port mapping through webshell. It can be directly used by metasploit-framework, viper, cobalt strike for...
Advanced Fuzzing Library - Slot your own fuzzers together and extend their features using Rust. LibAFL is written and maintained...
The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be...
virtual chunks, then each one is tested against next chunks. So complexity is equal to th triangle number: Throubleshotting If...
The WinPmem memory acquisition driver and userspaceWinPmem has been the default open source memory acquisition driver for windows for a...
Tool Social Engineering (Access Webcam, Microphone, OS Password Grabber And Location Finder) With NgrokFeatures:Get Device Information Without Any Permissions Access...
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.Install:cd /optgit clone https://github.com/stark0de/nginxpwnercd nginxpwnerchmod +x install.sh./install.sh Usage:Target...
Paragon is a Red Team engagement platform. It aims to unify offensive tools behind a simple UI, abstracting much of...
very advanced fuzzer compilingInstall nim from nim-lang.org Run nimble build A vaf.exe file will be created in your directory ready...
SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish...
Automated Tool That Generate A Powershell Oneliner That Can Create Meterpreter Shell On Metasploit,Bypass AMSI,Bypass Firewall,Bypass UAC,And Bypass Any AVs....
The all_groups.py script allows to enumerate all Microsoft 365 Groups in a Azure AD tenant with their metadata: name visibility:...
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free...
Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any...
Lookups for real IP starting from the favicon icon and using Shodan.Installationpip3 install -r requirements.txt Shodan API key (not the...
Offline search tool for LDAP directory dumps in LDIF format. FeaturesFast and memory efficient parsing of LDIF files Build ldapsearch...
Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function. You can use this tool...
Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well...
Introducing TScopyIt is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the...
Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and...