Gitjacker – Leak Git Repositories From Misconfigured Websites
Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will...
Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will...
Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI Installationgit clone https://github.com/Mrakovic-ORG/NashaVM --recursecd NashaVMNashaVMnuget...
SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities...
c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points,...
As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry...
For many security teams, vulnerability risk management can feel like an endless climb. The truth is, no IT environment will...
CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a...
GHunt is an OSINT tool to extract a lot of informations of someone's Google Account email. It can currently extract...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
The shopping isn't finished once you've purchased your item. If you've ever done shopping online, then you know all about...
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN...
IoTMap is a tool that models IoT networks using one or multiple protocols simultaneously. This is work in progress, as...
We are delighted to announce that Log Search now supports grouping by multiple fields in your log data. By running...
On Oct. 1, the United States Treasury Department Office of Foreign Assets Control (OFAC) issued an advisory concerning ransomware payments...
kube-score is a tool that performs static code analysis of your Kubernetes object definitions. The output is a list of...
This script was to developed to capture screenshot during pentest engagment and OSCP. IMPORTANT: The screenshot feature is no longer...
The importance of information security in the modern business world cannot be overstated. It’s vital for organizations to take a...
#Manual Port Scanning #Enumerate Potential Service If you like the tool and for my personal motivation so as to develop...
This Is Advance Phishing Tool! OTP PHISHING SPECIAL OTP BYPASS VIDEO WORKEDSocial Media Hack Link Installation Termux https://www.youtube.com/watch?v=LO3hX1lLBjI Whatsapp OTP...
Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible...
Asnap aims to render recon phase easier by providing regularly updated data about which companies owns which ipv4 or ipv6...
Unicode encoding attacks with machine learning. Tool based on machine learning to create amazing fake domains using confusables. Some domains...
SMB AutoRelay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments. Usage...
Powerglot encodes several kind of scripts using polyglots, for example, offensive powershell scripts. It is not needed a loader to...