Nuages - A Modular C2 Framework
Nuages is a modular C2 framework.Refer to the Wiki for documentation, do not hesitate to open issues for help, bug reports or feature requestsIntroductionNuages aims at being a C2 framework in which...
View ArticleHashcatch - Capture Handshakes Of Nearby WiFi Networks Automatically
Hashcatch deauthenticates clients connected to all nearby WiFi networks and tries to capture the handshakes. It can be used in any linux device including Raspberry Pi and Nethunter devices so that you...
View ArticleConstellation - A Graph-Focused Data Visualisation And Interactive Analysis...
Constellation is a graph-focused data visualisation and interactive analysis application enabling data access, federation and manipulation capabilities across large and complex data sets.Vision...
View Article0xsp Mongoose v1.7 - Linux/Windows Privilege Escalation intelligent...
Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks, starting from collecting information stage until reporting information...
View ArticleB-XSSRF - Toolkit To Detect And Keep Track On Blind XSS, XXE And SSRF
Toolkit to detect and keep track on Blind XSS, XXE& SSRF.SETUPUpload the files to your server.Create a Database and upload database.sql file to it.Change the DB Credentials in db.php...
View ArticleHTTP Request Smuggler - Extension For Burp Suite Designed To Help You Launch...
This is an extension for Burp Suite designed to help you launch HTTP Request Smuggling attacks, originally created during HTTP Desync Attacks research. It supports scanning for Request Smuggling...
View ArticleTelegram C# C2 - A Command and Control Tool for Telegram Bot Communication
Command and Control for C# WritingAuthor: LeiothrixTelegram: @LeiothrixTwitter: @wh4am1Team: QQæ„›&LoveInstallNuget download these packageusing System.IO;using Telegram.Bot;using...
View ArticleBarq - The AWS Cloud Post Exploitation Framework!
barq: The AWS Cloud Post Exploitation framework!What is it?barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...
View ArticleWordlister - A Simple Wordlist Generator And Mangler Written In Python
A simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order to speed up his job (CPU intensive).Supported...
View ArticleEhtools - Framework Of Serious Wi-Fi Penetration Tools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and...
View ArticlempDNS - Multi-Purpose DNS Server
Simple, configurable "clone & run" DNS Server with multiple useful featuresShould work on Python 2 and 3names.db -> holds all custom records (see examples)Simple wildcards like...
View ArticleBtlejack - Bluetooth Low Energy Swiss-army Knife
Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC Micro:Bit. devices running a dedicated firmware. You may also want to use an...
View ArticlePyFuscation - Obfuscate Powershell Scripts By Replacing Function Names,...
PyFuscationRequires python3usage: PyFuscation.py [-h] [-f] [-v] [-p] [--ps SCRIPT]Optional arguments:• -h, --help show this help message and exit• -f Obfuscate functions○ Do this First ... Its probably...
View ArticleEMAGNET - Tool For Find Leaked Databases With 97.1% Accurate To Grab Mail +...
Emagnet is a very powerful tool for it's purpose wich is to capture email addresses and passwords from leaked databases uploaded on pastebin. It's almost impossible to find leaked passwords when they...
View ArticleBLUESPAWN - Windows Based Active Defense Tool To Empower Blue Teams
BLUESPAWN helps blue teams monitor Windows systems in real-time against active attackers by detecting anomalous activityWhy we made BLUESPAWNWe've created and open-sourced this for a number of reasons...
View ArticleMondoo - Cloud-Native Security And Vulnerability Risk Management
Quick StartInstall mondoo:Workstationexport MONDOO_REGISTRATION_TOKEN='changeme'curl -sSL http://mondoo.io/download.sh | bashServiceexport MONDOO_REGISTRATION_TOKEN='changeme'curl -sSL...
View ArticlePingCastle - Get Active Directory Security At 80% In 20% Of The Time
The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org.Ping Castle is a tool designed to...
View ArticlePhishing-Simulation - Aims To Increase Phishing Awareness By Providing An...
Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup - no domain, no infrastructure, no actual email...
View ArticleBlackArch Linux v2019.09.01 - Penetration Testing Distribution
BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 2336tools. You can install tools individually or in groups. BlackArch Linux...
View ArticleOpenCTI - Open Cyber Threat Intelligence Platform
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize...
View Article