OverRide – Binary Exploitation And Reverse-Engineering (From Assembly Into C)
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag...
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag...
This is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack...
Announcement post ipcdump is a tool for tracing interprocess communication (IPC) on Linux. It covers most of the common IPC...
CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization....
VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the...
BuildTo build this project, run the make command from the root folder. Quick BuildTo run quick build for Linux, you...
dnspeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name...
Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user...
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not...
Reproxy is a simple edge HTTP(s) server / reverse proxy supporting various providers (docker, static, file). One or more providers...
A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. The tool was...
Run Ubuntu GUI on your termux with much features. FeaturesFixed Audio Output Lightweight {Requires at least 4GB Storage} Katoolin3 tool...
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.DescriptionThis is a bash script...
Password list generator for password spraying - prebaked with goodies Version 1.4 Generates permutations of Months, Seasons, Years, Sports Teams...
Validate large HTTP-based attack surfaces in a very fast way. Heavily inspired by Aquatone. Why?When I utilize Aquatone to flyover...
An open source serveo/ngrok alternative.DeployBuilds are made automatically for each commit to the repo and are pushed to Dockerhub. Builds...
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN...
Scripted collection of system information valuable to a Forensic Analyst. IRTriage will automatically "Run As ADMINISTRATOR" in all Windows versions...
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses...
Powerfull Batch File To Disable Windows Defender,Firewall,Smartscreen And Execute the payloadUsage :Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the...
The developers swissknife. Do conversions and generations right out of vs code. Extendable with user scripts Available in the Visual...
Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and...
A script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing...
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of...