LightsOut – Generate An Obfuscated DLL That Will Disable AMSI And ETW
LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done...
LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done...
BREAD (BIOS Reverse Engineering & Advanced Debugging) is an 'injectable' real-mode x86 debugger that can debug arbitrary real-mode code (on...
LTESniffer is An Open-source LTE Downlink/Uplink Eavesdropper It first decodes the Physical Downlink Control Channel (PDCCH) to obtain the Downlink...
padre is an advanced exploiter for Padding Oracle attacks against CBC mode encryption Features: blazing fast, concurrent implementation decryption of...
Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in...
Forbidden Buster is a tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes...
Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan...
Crawlector (the name Crawlector is a combination of Crawler & Detector) is a threat hunting framework designed for scanning websites...
Welcome to CryptChat - where conversations remain truly private. Built on the robust Python ecosystem, our application ensures that every...
Afuzz is an automated web path fuzzing tool for the Bug Bounty projects. Afuzz is being actively developed by @rapiddns...
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system...
Double Venom (DVenom) is a tool that helps red teamers bypass AVs by providing an encryption wrapper and loader for...
Elevation Station Stealing and Duplicating SYSTEM tokens for fun & profit! We duplicate things, make twin copies, and then ride...
A cutting-edge utility designed exclusively for web security aficionados, penetration testers, and system administrators. WebSecProbe is your advanced toolkit for...
The Network Compromise Assessment Tool is designed to analyze pcap files to detect potential suspicious network traffic. This tool focuses...
TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the...
The purpose of the project is to create rate limit in AWS WaF based on HTTP headers.Golang is a dependencie...
TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files. It provides insights into...
Simple Latest CVE Collector Written in Python There are various methods for collecting the latest CVE (Common Vulnerabilities and Exposures)...
Rapidly host payloads and post-exploitation bins over HTTP or HTTPS. Designed to be used on exams like OSCP / PNPT...
PoC for dumping and decrypting cookies in the latest version of Microsoft Teams extract.py just dumps without arguments extract.exe is...
A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates. IF you are interested in seing all...
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later...
Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit...