HTTP Asynchronous Reverse Shell - Asynchronous Reverse Shell Using The HTTP...
Today there are many ways to create a reverse shell in order to be able to remotely control a machine through a firewall. Indeed, outgoing connections are not always filtered.However security software...
View ArticleHoneyBot - Capture, Upload And Analyze Network Traffic
HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides three scripts:capture-and-analyze.py - Capture on an...
View ArticleNTLMRecon - A Tool To Enumerate Information From NTLM Authentication Enabled...
Note that the tool is still under development. Things may break anytime - hence, beta!A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about...
View ArticleProton Framework - A Windows Post Exploitation Framework Similar To Other...
About Proton FrameworkProton Framework is a Windows post exploitation framework similar to other penetration testing tools such as Meterpreter and Powershell Invader Framework. The major difference is...
View ArticleEvil SSDP - Spoof SSDP Replies And Create Fake UPnP Devices To Phish For...
This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are...
View ArticleSSRF Sheriff - A Simple SSRF-testing Sheriff Written In Go
This is an SSRFtesting sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking Event, but it is now being open-sourced for other organizations to implement and...
View ArticleFuzzBench - Fuzzer Benchmarking As A Service
FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal of FuzzBench is to make it painless to rigorously evaluate fuzzingresearch and...
View ArticleSifter - A OSINT, Recon And Vulnerability Scanner
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote...
View ArticleRedRabbit - Red Team PowerShell Script
RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally by downloading the script or run remotely using:powershell –nop –c...
View ArticlePentest Tools Framework - A Database Of Exploits, Scanners And Tools For...
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel...
View ArticleDirble - Fast Directory Scanning And Scraping Tool
Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy to use.How to UseDownload one of the precompiled binaries for Linux, Windows, or Mac, or...
View ArticleBetwixt - Web Debugging Proxy Based On Chrome DevTools Network Panel
Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface.InstallingDownload the latest release for your operating system, build your own bundle or run...
View ArticlePickl3 - Windows Active User Credential Phishing Tool
Pickl3 is Windows active user credential phishing tool. You can execute the Pickl3 and phish the target user credential.Operational Usage - 1Nowadays, since the operating system of many end users is...
View ArticleZelos - A Comprehensive Binary Emulation Platform
Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess the dynamic behavior of binaries via command-line or python...
View ArticleTEA - Ssh-Client Worm
A ssh-client worm made with tas framework.How it works?This is a fakessh-client that manipulates the tty input/output to execute arbitrary commands and upload itself through the ssh connection.To work...
View ArticleJeopardize - A Low(Zero) Cost Threat Intelligence & Response Tool Against...
Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It detects registered phishing domain candidates...
View ArticleAWSGen.py - Generates Permutations, Alterations And Mutations Of AWS S3...
AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py
View ArticleshuffleDNS - Wrapper Around Massdns Written In Go That Allows You To...
shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output...
View ArticleToken-Reverser - Word List Generator To Crack Security Tokens
Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent to your email box (e.g. 582431d4c7b57cb4a3570041ffeb7e10) You...
View ArticlePypykatz - Mimikatz Implementation In Pure Python
Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version 0.1.1 the command line changed a little. Worry not, I have an awesome...
View Article