Hvazard - Remove Short Passwords & Duplicates, Change Lowercase To Uppercase...
Remove short passwords& duplicates, change lowercase to uppercase & reverse, combine wordlists!Manual & explaination-d --dict Specifies the file you want to modify. This is the only...
View ArticleSUDO_KILLER - A Tool To Identify And Exploit Sudo Rules Misconfigurations And...
If you like the project and for my personal motivation so as to develop other tools please a +1 star *SUDO_KILLERSUDO_KILLER is a tool which help to abuse SUDO in different ways and with the main...
View ArticleHiddenEye - Modern Phishing Tool With Advanced Functionality...
Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERINGDEVELOPERS & CONTRIBUTORSANONUD4Y...
View ArticleDockernymous - A Script Used To Create A Whonix Like Gateway/Workstation...
Dockernymous is a start script for Docker that runs and configures two individual Linux containers in order act as a anonymisation workstation-gateway set up.It's aimed towards experienced Linux/Docker...
View ArticleVulnWhisperer - Create Actionable Data From Your Vulnerability Scans
Create actionable data from your vulnerability scans VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability...
View ArticleAMIRA - Automated Malware Incident Response & Analysis
AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters, in particular The One Filter to Rule...
View ArticleAiropy - Get Clients And Access Points
Get clients and access points. With Alfa cards this script works correctly.DependenciesTo run this script first install requirements as follows:sudo pip3 install requirements.txt How to useIn the...
View ArticleEvil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting
The ultimate WinRM shell for hacking/pentesting. ___ __ __ ____ _ / _] | || || | / [_| | | | | | | | _] | | | | | |___ | [_| : | | | | | | |\ / | | | | |_____| \_/ |____||_____| __ __ ____ ____ ____...
View ArticlePyattck - A Python Module To Interact With The Mitre ATT&CK Framework
A Python Module to interact with the Mitre ATT&CK Framework.pyattck has the following notable features in it's current release: Retrieve all Tactics, Techniques, Actors, Malware, Tools, and...
View ArticleO365-Attack-Toolkit - A Toolkit To Attack Office365
o365-attack-toolkit allows operators to perform an OAuth phishing attack and later on use the Microsoft Graph API to extract interesting information.Some of the implemented features are :Extraction of...
View ArticlegrapheneX - Automated System Hardening Framework
grapheneXIn computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a...
View ArticleCloudcheck - Checks Using A Test String If A Cloudflare DNS Bypass Is...
Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using.Also create a empty text file called none.txt in the data folder,...
View ArticleOrbit v2.0 - Blockchain Transactions Investigation Tool
IntroductionOrbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered as a graph to reveal major sources, sinks and...
View ArticleVulnado - Purposely Vulnerable Java Application To Help Lead Secure Coding...
This application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.Up and runningInstall Docker for MacOS or Windows. You'll need to create a Docker...
View ArticleOSXCollector - A Forensic Evidence Collection & Analysis Toolkit For OS X
OSXCollector is a forensic evidence collection & analysis toolkit for OSX.Forensic CollectionThe collection script runs on a potentially infected machine and outputs a JSON file that describes the...
View ArticleUncompyle6 - A Cross-Version Python Bytecode Decompiler
A native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.Introductionuncompyle6 translates Python bytecode back into equivalent Python...
View ArticleRecon-ng v5.0.0 - Open Source Intelligence Gathering Tool Aimed At Reducing...
Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open-source web-based reconnaissance quickly and thoroughly.Recon-ng has a...
View ArticleRedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To...
Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.PayloadsFunction to generate various encoded reverse shells in...
View ArticleWeebDNS - DNS Enumeration With Asynchronicity
DNS Enumeration Tool with Asynchronicity.FeaturesWeebDNS is an 'Asynchronous' DNS Enumeration Tool made with Python3 which makes it much faster than normal Tools.PREREQUISITESPython 3.xpip3gitPYTHON 3...
View ArticleWDExtract - Extract Windows Defender Database From Vdm Files And Unpack It
Extract Windows Defender database from vdm files and unpack itThis program distributed as-is, without any warranty;No official support, if you like this tool, feel free to contribute.FeaturesUnpack VDM...
View Article