ABD - Course Materials For Advanced Binary Deobfuscation
Advanced Binary DeobfuscationThis repository contains the course materials of Advanced Binary Deobfuscation at the Global Cybersecurity Camp (GCC) Tokyo in 2020.Course AbstractReverse engineering is...
View ArticleProgress-Burp - Burp Suite Extension To Track Vulnerability Assessment Progress
Burp Suite extension to track vulnerability assessment progress.Features Capture items (unique requests) from the Burp Suite tools (Proxy, Repeater, Target). Request unique key is defined as follows:...
View ArticleMulti-Juicer - Run Capture The Flags And Security Trainings With OWASP Juice...
Running CTFs and Security Trainings with OWASP Juice Shop is usually quite tricky, Juice Shop just isn't intended to be used by multiple users at a time. Instructing everybody how to start Juice Shop...
View ArticleMouse Framework - An iOS And macOS Post Exploitation Surveillance Framework...
About Mouse FrameworkMouse Framework is an iOS and macOS post exploitation surveillance framework that gives you a command line session with extra functionality between you and a target machine using...
View ArticlePolyshell - A Bash/Batch/PowerShell Polyglot!
PolyShell is a script that's simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot).This makes PolyShell a useful template for penetration testing as it can be executed on most...
View ArticleIoTGoat - A Deliberately Insecure Firmware Based On OpenWrt
The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities...
View ArticleExtended-SSRF-Search - Smart SSRF Scanner Using Different Methods Like...
This tool search for SSRF using predefined settings in different parts of a request (path, host, headers, post and get parameters).First stepRename example.app-settings.conf to app-settings.conf and...
View ArticleSubfinder - A Subdomain Discovery Tool That Discovers Valid Subdomains For...
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. subfinder is built...
View ArticleXencrypt - A PowerShell Script Anti-Virus Evasion Tool
Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it be awesome if you could take any script and automatically and with...
View ArticleBadBlood - Fills A Microsoft Active Directory Domain With A Structure And...
BadBlood by Secframe fills a MicrosoftActive Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran...
View ArticlednsFookup - DNS Rebinding Toolkit
DNS Rebinding freamwork containing:a dns server obviouslyweb api to create new subdomains and control the dns server, view logs, stuff like thatshitty react app to make it even more comfyWhat does it...
View ArticleWiFi Passview v2.0 - An Open Source Batch Script Based WiFi Passview For...
WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This is for Windows OS only. Basically, this scripted program has the same function as...
View ArticleXCTR Hacking Tools - All in one tools for Information Gathering
All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will save everything.All of the collected information is saved...
View ArticleTwitWork - Monitor Twitter Stream
Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that allows you to filter the flow on one (or more) keywords or on an @ based on...
View ArticlePrivescCheck - Privilege Escalation Enumeration Script For Windows
This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information which might be useful for exploitation and/or...
View ArticlePhonia Toolkit - One Of The Most Advanced Toolkits To Scan Phone Numbers...
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any...
View ArticleExtended-XSS-Search - Scans For Different Types Of XSS On A List Of URLs
This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker to perform not only GET but also POST requests. Additionally its...
View ArticleGhost Framework - An Android Post Exploitation Framework That Uses An Android...
Ghost Framework is an Android post exploitation framework that uses anAndroid Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android...
View ArticleSharpRDP - Remote Desktop Protocol .NET Console Application For Authenticated...
To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release directory, you do not need those because the DLLs are in the assembly. If you do not want to...
View ArticleEntropy Toolkit - A Set Of Tools To Exploit Netwave And GoAhead IP Webcams
Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for webcams penetration testing.Getting startedEntropy installationcd entropychmod +x...
View Article