FudgeC2 - A Collaborative C2 Framework For Purple-Teaming Written In Python3,...
FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining, and usage visibility.Note: FudgeC2 is...
View ArticleDr. ROBOT - Tool To Enumerate The Subdomains Associated With A Company By...
Dr. ROBOT is a tool for Domain Reconnaissance and Enumeration. By utilizing containers to reduce the overhead of dealing with dependencies, inconsistency across operating sytems, and different...
View ArticleDolos Cloak - Automated 802.1X Bypass
Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced man-in-the-middle attack. The tool is able to piggyback on the...
View ArticlePixload - Image Payload Creating/Injecting Tools
Set of tools for creating/injecting payload into images.SETUPThe following Perl modules are required:- GD- Image::ExifTool- String::CRC32On Debian-based systems install these packages:sudo apt install...
View ArticleSysAnalyzer - Automated Malcode Analysis System
SysAnalyzer is an open-source application that was designed to give malcode analysts an automated tool to quickly collect, compare, and report on the actions a binary took while running on the system.A...
View ArticleKirjuri - Web Application For Managing Cases And Physical Forensic Evidence...
Kirjuri is a simple php/mysql web application for managing physical forensic evidence items. It is intended to be used as a workflow tool from receiving, booking, note-taking and possibly reporting...
View ArticleMitaka - A Browser Extension For OSINT Search
Mitaka is a browser extension for OSINT search which can:Extract & refang IoC from a selected block of text. E.g. example[.]com to example.com, test[at]example.com to test@example.com,...
View ArticleScoutSuite - Multi-Cloud Security Auditing Tool
Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers...
View ArticleJuicy Potato - A Sugared Version Of RottenPotatoNG, With A Bit Of Juice, I.E....
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEMSummaryRottenPotatoNG and its variants...
View ArticleArmourBird CSF - Container Security Framework
ArmourBird CSF - Container Security Framework is an extensible, modular, API-first framework build for regular security monitoring of docker installations and containers against CIS and other custom...
View ArticleSKA - Simple Karma Attack
SKA allows you to implement a very simple and fast karma attack.You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of the AP (evil twin...
View ArticleTachyon - Fast HTTP Dead File Finder
Tachyon is a fast web application security reconnaissance tool.It is specifically meant to crawl web application and look for left over or non-indexed files with the addition of reporting pages or...
View ArticleRouter Exploit Shovel - Automated Application Generation For Stack Overflow...
Automated Application Generation for Stack Overflow Types on Wireless RoutersRouter exploits shovel is an automated application generation tool for stack overflow types on wireless routers. The tool...
View ArticleFirmware Analysis Toolkit - Toolkit To Emulate Firmware And Analyse It For...
FAT is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware. This is built in order to use for the "Offensive IoT Exploitation"...
View ArticleFlare-Emu - Powered by IDA Pro and the Unicorn emulation framework that...
flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible interface for scripting emulation tasks. It is designed...
View ArticleMemProcFS - The Memory Process File System
The Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system.Easy trivial point and click memory analysis without the need for complicated...
View ArticleFDsploit - File Inclusion And Directory Traversal Fuzzing, Enumeration &...
A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.FDsploit menu:$ python fdsploit.py -h _____ ____ _ _ _ | __| \ ___ ___| |___|_| |_ | __| | |_ -| . | | . | | _|...
View ArticleRebel-Framework - Advanced And Easy To Use Penetration Testing Framework
Automate the automation STARTgit clone https://github.com/rebellionil/rebel-framework.gitcd rebel-frameworkbash setup.shbash rebel.shMODULESSCREENSHOTSDEMOSSUPPORTED DISTRIBUTIONSDistributionVersion...
View ArticleKube-Alien - Tool To Launches Attack on K8s Cluster from Within
This tool launches attack on k8s cluster from within. That means you already need to have an access with permission to deploy pods in a cluster to run it. After running the kube-alien pod it tries to...
View ArticleHRShell - An Advanced HTTPS/HTTP Reverse Shell Built With Flask
HRShell: An advanced HTTP(S) Reverse Shell built with FlaskHRShell is an HTTPS/HTTP reverse shell built with flask. It's compatible with python 3.x and has been successfully tested on:Linux ubuntu...
View Article