CHIPSEC - Platform Security Assessment Framework
CHIPSEC is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing...
View ArticleBeRoot For Windows - Privilege Escalation Project
BeRoot(s) is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. A compiled version is available here.It will be added to the pupy project as a...
View ArticleBeRoot For Linux - Privilege Escalation Project
BeRoot is a post exploitation tool to check common misconfigurations on Linux and Mac OS to find a way to escalate our privilege.To understand privilege escalation on these systems, you should...
View ArticleMquery - YARA Malware Query Accelerator (Web Frontend)
Ever had trouble searching for particular malware samples? This project is an analyst-friendly web GUI to look through your digital warehouse.mquery can be used to search through terabytes of malware...
View ArticleMalwLess - Test Blue Team Detections Without Running Any Attack
MalwLess is an open source tool that allows you to simulate system compromise or attack behaviours without running processes or PoCs. The tool is designed to test Blue Team detections and SIEM...
View ArticleAmass - In-depth Subdomain Enumeration
The Amass tool performs scraping of data sources, recursive brute forcing, crawling of web archives, permuting and altering of names and reverse DNS sweeping to obtain additional subdomain names....
View ArticleOptiva Framework - Web Application Scanner
You can use this Framework on your website to check the security of your website by finding the vulnerability in your website or you can use this tool to Get admin panel search SQL injection by dork As...
View ArticleStego-Toolkit - Collection Of Steganography Tools (Helps With CTF Challenges)
This project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox.eu. The image comes preinstalled with many popular (see list below) and...
View ArticlePspy - Monitor Linux Processes Without Root Permissions
pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of...
View ArticleLynis 2.6.5 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleIdisagree - Control Remote Computers Using Discord Bot
Control remote computers using discord bot and python 3.[ ! ] If your target is a windows system, you may want to compile your payload. Do this with py2exe or pyinstaller.MAINTAINERSAlisson Moretto |...
View ArticleSubFinder - A Subdomain Discovery Tool That Discovers Valid Subdomains For...
SubFinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and has been aimed as a successor to sublist3r...
View ArticleThe Rogue Toolkit - An Extensible Toolkit Aimed At Providing Penetration...
The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for the purpose of conducting penetration testing...
View ArticleIkeext-Privesc - Windows IKEEXT DLL Hijacking Exploit Tool
This tool is intended for automatically detecting and exploiting the IKE and AuthIP IPsec Keyring Modules Service (IKEEXT) Missing DLL vulnerability.  DescriptionA major weakness is present in Windows...
View ArticleLog Killer - Clear All Your Logs In (Linux/Windows) Servers
Log Killer is tool for [Linux/Windows] Servers. This tool will delete all your logs, just download the tool and run it on the server, if your server OS is Windows download the batch file but, if your...
View ArticleAker - SSH Bastion/Jump Host/Jumpserver
Aker is a security tool that helps you configure your own Linux ssh jump/bastion host. Named after an Egyptian mythology deity who guarded the borders, Aker would act as choke point through which all...
View ArticleFirecall - Automate SSH Communication With Firewalls, Switches, Etc.
Automate SSH communication with firewalls, switches, etc.DescriptionThese scripts are designed to automate sending commands to a Cisco ASA firewall. The intended purpose here is to eliminate the need...
View ArticleMasc - A Web Malware Scanner
A malware (web) scanner developed during CyperCamp Hackathon 2017.FeaturesAt the moment, there are some features avaiable for any type of website (custom or CMS) and some of them only available for...
View ArticleDevploit v3.6 - Information Gathering Tool
Devploit is a simple python script to Information Gathering.Download:git clone https://github.com/joker25000/DevploitHow to use:cd Devploitchmod +x install./installRun in TerminalDevploit(To run in...
View ArticleEagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles...
Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search.This only works if their Facebook Profile is publicWhat does this do?In simple words...
View Article