Donut - Generates X86, X64, Or AMD64+x86 Position-Independent Shellcode That...
Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an arbitrary Windows processes for in-memory execution....
View ArticleSojobo - A Binary Analysis Framework
Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need to install or compile any other...
View ArticleVscan - Vulnerability Scanner Tool Using Nmap And Nse Scripts
vulnerability scanner tool is using nmap and nse scripts to find vulnerabilitiesThis tool puts an additional value into vulnerability scanning with nmap. It uses NSE scripts which can add flexibility...
View ArticleDFIRtriage - Digital Forensic Acquisition Tool For Windows Based Incident...
DFIRtriage is a tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to eliminate the dependency of python on the target host. The tool will...
View ArticleSgx-Step - A Practical Attack Framework For Precise Enclave Execution Control
SGX-Step is an open-source framework to facilitate side-channel attack research on Intel SGX platforms. SGX-Step consists of an adversarial Linux kernel driver and user space library that allow to...
View ArticleAdaudit - Powershell Script To Do Domain Auditing Automation
PowerShell Script to perform a quick AD audit_____ ____ _____ _ _ _| _ | \ | _ |_ _ _| |_| |_| | | | | | | | . | | _||__|__|____/ |__|__|___|___|_|_| by phillips321If you have any decent powershell one...
View Articlethreat_note - DPS' Lightweight Investigation Notebook
threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research. As of right now this includes the...
View ArticleGCPBucketBrute - A Script To Enumerate Google Storage Buckets, Determine What...
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.This script (optionally) accepts GCP user/service account...
View ArticleHAL - The Hardware Analyzer
HAL [/hel/] is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes with a fully-fledged plugin...
View ArticleCacti - Complete Network Graphing Solution
IMPORTANTWhen using source or by downloading the code directly from the repository, it is important to run the database upgrade script if you experience any errors referring to missing tables or...
View ArticleRsdl - Subdomain Scan With Ping Method
Subdomain Scan With Ping Method.FlagsValueDescription--hostnameexample.comDomain for scan.--outputRecords the output with the domain name.--list/tmp/lists/example.txtLister for...
View ArticleNetAss2 - Network Assessment Assistance Framework
Easier network scanning with NetAss2 (Network Assessment Assistance Framework).Make it easy for Pentester to do penetration testing on network.Dependenciesnmap (tool)zmap (tool)Installationgit clone...
View ArticleAsset Discover - Burp Suite Extension To Discover Assets From HTTP Response
Burp Suite extension to discover assets from HTTP response using passive scanning. Refer our blog Asset Discovery using Burp Suite for more details.The extension is now part of the BApp store and can...
View ArticleBrave Browser - Next Generation Secure, Fast And Private Web Browser with...
The Brave Privacy Browser is your fast, safe private web browser with ad blocker, private tabs and pop-up blocker. Browse without being tracked by advertisers, malware and pop-ups. Fast & Secure...
View ArticleRainbow Crackalack - Rainbow Table Generation And Lookup Tools
This project produces open-source code to generate rainbow tables as well as use them to look up password hashes. While the current release only supports NTLM, future releases aim to support MD5,...
View ArticleEvil-Winrm v1.9 - The Ultimate WinRM Shell For Hacking/Pentesting
This shell is the ultimate WinRM shell for hacking/pentesting.WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows...
View ArticleRFI/LFI Payload List
As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course it takes a second person to have it. Now this article will hopefully give you an idea of...
View ArticleJaeles - The Swiss Army Knife For Automated Web Application Testing
Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.Installationgo get -u github.com/jaeles-project/jaelesPlease visit the...
View ArticleVulnx v1.9 - An Intelligent Bot Auto Shell Injector That Detect...
Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like...
View ArticleSeeker v1.1.9 - Accurately Locate Smartphones Using Social Engineering
Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.Seeker Hosts a fake...
View Article