SharpMapExec – A Sharpen Version Of CrackMapExec
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should...
Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit...
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.Options -q,...
Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process...
A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and...
Information Gathering Tool - Dns/Subdomain/Port EnumerationInstallationFirst of all, clone the repo locally git clone https://github.com/edoardottt/scilla.git Scilla has external dependencies, so...
Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365)....
E9Patch is a powerful static binary rewriting tool for x86_64 Linux ELF binaries. E9Patch is: Scalable: E9Patch can reliably rewrite...
PoshBot is a chat bot written in PowerShell. It makes extensive use of classes introduced in PowerShell 5.0. PowerShell modules...
Are you tired of being the cybersecurity help desk for everyone you know? Are you frustrated with spending all your...
Since the launch of InsightVM’s Custom Policy Builder in June of this year, hundreds of organizations have created and customized...
Freki is a free and open-source malware analysis platform.GoalsFacilitate malware analysis and reverse engineering; Provide an easy-to-use REST API...
About Ghost FrameworkGhost Framework is an Android post-exploitation framework that exploits theAndroid Debug Bridge to remotely access an Android device....
Happy HaXmas, everyone! This has been quite the year, but we’re thrilled that we’re able to keep up our favorite...
APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer and more to the excellent VS Code so you can...
A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS...
Back in July, Rapid7 released its first-ever National / Industry / Cloud Exposure Report, otherwise known as “NICER.” This report...
A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object.BackgroundFor background...
Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built...
On Dec. 12, 2020, FireEye provided detailed information on a widespread attack campaign involving a backdoored component of the SolarWinds...
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim's NAT/firewall...
An burpsuite extension to bypass 403 restricted directory. By using PassiveScan (default enabled), each 403 request will be automatically scanned...
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its...