DrSemu - Malware Detection And Classification Tool Based On Dynamic Behavior
Dr.Semu runs executables in an isolated environment, monitors the behavior of a process, and based on Dr.Semu rules created by you or the community, detects if the process is malicious or not.whoami:...
View ArticleDecryptTeamViewer - Enumerate And Decrypt TeamViewer Credentials From Windows...
Uses CVE-2019-18988 to enumerate and decrypt TeamViewer credentials from Windows registry. Blogpost detailing the vulnerability:...
View ArticleGospider - Fast Web Spider Written In Go
GoSpider - Fast web spider written in GoInstallationgo get -u github.com/jaeles-project/gospiderFeaturesFast web crawlingBrute force and parse sitemap.xmlParse robots.txtGenerate and verify link from...
View ArticleNekoBot - Auto Exploiter With 500+ Exploit 2000+ Shell
NekoBotV1 | Auto Exploiter With 500+ Exploit 2000+ ShellFeatures :[+] Wordpress :1- Cherry-Plugin2- download-manager Plugin3- wysija-newsletters4- Slider Revolution [Revslider]5- gravity-forms6-...
View ArticleCVE Api - Parse & filter the latest CVEs from cve.mitre.org
Parse & filter the latest CVEs from https://cve.mitre.org. DocsUsagehttp://localhost:4000/cve?target=KEYWORDThe year parameter is...
View Article0L4Bs - Cross-site Scripting Labs For Web Application Security Enthusiasts
Cross-site scripting labs for web application security enthusiastsList of Chall :~ Chall 1 | URL~ Chall 2 | Form~ Chall 3 | User-Agent~ Chall 4 | Referrer~ Chall 5 | Cookie~ Chall 6 | LocalStorage~...
View ArticleRabid - A CLI Tool And Library Allowing To Simply Decode All Kind Of BigIP...
RApid Big IP DecoderWhat it isA CLI tool and library allowing to simply decode all kind of BigIP cookies.FeaturesSupport all 4 cookie formatsCLI tool & libraryHackableReferencesHomepage /...
View ArticleMetabigor - Intelligence Tool But Without API Key
Intelligence Tool but without API keyWhat is Metabigor?Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key.Installationgo get -u...
View ArticleAdama - Searches For Threat Hunting And Security Analytics
AdamaSearches For Threat Hunting and Security AnalyticsA collection of known log and / or event data searches for threat hunting and detection. They enumerate sets of searches used across many...
View ArticleSUDO_KILLER - A Tool To Identify And Exploit Sudo Rules' Misconfigurations...
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other tools please a +1 star *The tool can be used by pentesters, system admins, CTF...
View ArticleTaskManager-Button-Disabler - Simple Way To Disable/Rename Buttons From A...
Simple way to disable/rename buttons from a task manager.Installationgit clone https://github.com/Mrakovic-ORG/TaskManager-Button-Disablercd TaskManager-Button-Disabler\TaskManager Button...
View ArticleOWASP D4N155 - Intelligent And Dynamic Wordlist Using OSINT
It's an information security audit tool that creates intelligent wordlists based on the content of the target page.Help usSee some calculations usedInstallNeed to: Python3.6, Bash (GNU Bourne-Again...
View ArticleGadgetinspector - A Byte Code Analyzer For Finding Deserialization Gadget...
This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. By automatically discovering possible gadgets...
View ArticleOhmybackup - Scan Victim Backup Directories & Backup Files
ohmybackup - Scan Victim's Backup Directories & Backup FilesohmybackupScans backup folders on target sites. Searches archived files in the folders it finds. With the 2-file scanning system, it adds...
View ArticleDLLPasswordFilterImplant - DLL Password Filter Implant With Exfiltration...
DLLPasswordFilterImplant is a custom password filter DLL that allows the capture of a user's credentials. Each password change event on a domain will trigger the registered DLL in order to exfiltrate...
View ArticleLiffy - Local File Inclusion Exploitation Tool
LFI Exploitation toolA little python tool to perform Local file inclusion.Liffy v2.0 is the improved version of liffy which was originally created by rotlogix/liffy. The latter is no longer available...
View ArticleDnssearch - A Subdomain Enumeration Tool
This software is a subdomain enumeration tool.Purposednssearch takes an input domain ( -domain parameter ) and a wordlist ( -wordlist parameter ), it will then perform concurrent DNS requests using the...
View ArticleFaraday presents the latest version of their Security Platform for...
Miami, February 19, 2020 - Faraday is opening 2020 by strengthening their releases using the featured cybersecurity worldwide events calendar, starting next week with BSides and RSAC in San Francisco....
View Articleget_Team_Pass - Get Teamviewer's ID And Password From A Remote Computer In...
Get teamviewer's ID and password from a remote computer in the LANThis program gets teamviewer's ID and password from a remote computer in the LAN.Most useful for postexploitation or sysadminsTested on...
View ArticleWifi-Hacker - Shell Script For Attacking Wireless Connections Using Built-In...
Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)Download Wifi-Hacker
View Article