Laforge - Security Competition Infrastructure Automation Framework
Laforge enables rapid development of infrastructure for the purpose of information security competitions. Using a simple and intuitive configuration language, Laforge manages a dependency graph and...
View ArticleZabbix Threat Control - Zabbix Vulnerability Assessment Plugin
This plugin transforms your Zabbix monitoring system into vulnerability, risk and security managment system for your infrastructure.What the plugin doesIt provides Zabbix with information about...
View ArticleGetsploit v0.2.2 - Command Line Utility For Searching And Downloading Exploits
Command line search and download tool for Vulners Database inspired by searchsploit. It allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit,...
View ArticleGhostTunnel - A Covert Backdoor Transmission Method That Can Be Used In An...
GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload (agent), then the HID...
View ArticleSpykeyboard - Keylogger Which Sends Us The Data To Our Gmail
This is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py...
View ArticleSMBetray - SMB MiTM Tool With A Focus On Attacking Clients Through File...
Version 1.0.0. This tool is a PoC to demonstrate the ability of an attacker to intercept and modify insecure SMB connections, as well as compromise some secured SMB connections if credentials are...
View ArticleLeaked? - A Checking Tool For Hash Codes And Passwords Leaked
Leaked? is A Checking tool for Hash codes and Passwords leaked, use API from @webtobesocial.Leaked? can work in any OS if they have support Python 3FeaturesCheck passwords leakedCheck hash code...
View ArticleDatasploit - An OSINT Framework To Perform Various Recon Techniques On...
Overview of the tool:Performs OSINT on a domain/email/username/phone and find out information from different sources.Correlate and collaborate the results, show them in a consolidated manner.Tries to...
View ArticleR0Ak (The Ring 0 Army Knife) - A Command Line Utility To Read/Write/Execute...
r0ak is a Windows command-line utility that enables you to easily read, write, and execute kernel-mode code (with some limitations) from the command prompt, without requiring anything else other than...
View ArticleVulners Scanner - Vulnerability Scanner Based On Vulners.Com Audit API
PoC of a host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it.Supported OSCurrently support collecting...
View ArticleKisMac - Open Source Wireless Stumbling And Security Tool For Mac OS X
KisMAC is a free, open source wireless stumbling and security tool for Mac OS X.Whats new:Mac OS 10.9 - 10.12 (64-bit only)ARC (64-bit only)New GUIModern Objective-c syntaxRewrote most part of...
View ArticleExchangeRelayX - An NTLM Relay Tool To The EWS Endpoint For On-Premise...
Version 1.0.0. This tool is a PoC to demonstrate the ability of an attacker to perform an SMB or HTTP based NTLM relay attack to the EWS endpoint on an on-premise Microsoft Exchange server to...
View ArticleDrltrace - Drltrace Is A Library Calls Tracer For Windows And Linux Applications
Drltrace is a dynamic API calls tracer for Windows and Linux applications designed primarily for malware analysis. Drltrace is built on top of DynamoRIO dynamic binary instrumentation framework. The...
View ArticleSQLMap v1.2.9 - Automatic SQL Injection And Database Takeover Tool
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticleTor Browser 8.0 - Everything you Need to Safely Browse the Internet
Tor Browser 8.0, is the first stable release based on Firefox 60 ESR, is now available from the Tor Browser Project page and also from distribution directory. This release is all about users first.Tor...
View ArticlePEDA - Python Exploit Development Assistance For GDB
PEDA - Python Exploit Development Assistance for GDBKey Features:Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.Add commands to...
View Articlehtrace.sh - Simple Shell Script To Debugging HTTP/HTTPS Traffic Tracing,...
htrace.sh is a shell script that allows you to validate your domain configuration and catch any errors (e.g. redirect loops). It also displays basic information about the ssl configuration (if...
View ArticleJava-Stager - A PoC Java Stager Which Can Download, Compile, And Execute A...
A PoC Java Stager which can download, compile, and execute a Java file in memory.This is for research purposes only, do not use this where you are unauthorised to do so.What is this?This is based on...
View ArticleScrounger - Mobile Application Testing Toolkit
Scrounger - a person who borrows from or lives off others.There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that...
View ArticleWeb-Traffic-Generator - A Quick And Dirty HTTP/S "Organic" Traffic Generator
Just a simple (poorly written) Python script that aimlessly "browses" the internet by starting at pre-defined rootURLs and randomly "clicking" links on pages until the pre-defined clickDepth is met.I...
View Article