Modded-Ubuntu – Run Ubuntu GUI On Your Termux With Much Features
Run Ubuntu GUI on your termux with much features. FeaturesFixed Audio Output Lightweight {Requires at least 4GB Storage} Katoolin3 tool...
Run Ubuntu GUI on your termux with much features. FeaturesFixed Audio Output Lightweight {Requires at least 4GB Storage} Katoolin3 tool...
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.DescriptionThis is a bash script...
Password list generator for password spraying - prebaked with goodies Version 1.4 Generates permutations of Months, Seasons, Years, Sports Teams...
Validate large HTTP-based attack surfaces in a very fast way. Heavily inspired by Aquatone. Why?When I utilize Aquatone to flyover...
An open source serveo/ngrok alternative.DeployBuilds are made automatically for each commit to the repo and are pushed to Dockerhub. Builds...
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN...
Scripted collection of system information valuable to a Forensic Analyst. IRTriage will automatically "Run As ADMINISTRATOR" in all Windows versions...
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses...
Powerfull Batch File To Disable Windows Defender,Firewall,Smartscreen And Execute the payloadUsage :Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the...
The developers swissknife. Do conversions and generations right out of vs code. Extendable with user scripts Available in the Visual...
Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and...
A script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing...
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of...
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of...
dwn is a "docker-compose for hackers". Using a simple YAML "plan" format similar to docker-compose, image names, versions and volume...
Zero config (IoT) firewall. SYNwall is a project built (for the time being) as a Linux Kernel Module, to implement...
Simplistic yet fancy CPU architecture fetching tool1. Supportcpufetch currently supports x86_64 CPUs (both Intel and AMD) and ARM. Platform x86_64...
AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on...
An open-source Go project to test different web application firewalls (WAF) for detection logic and bypasses.How it worksIt is a...
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...
Maximizing BloodHound.DescriptionNew Release: dpat - The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info - Pull...
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...