O.G. AUTO-RECON - Enumerate A Target Based Off Of Nmap Results
Enumerate a target Based off of Nmap ResultsFeaturesThe purpose of O.G. Auto-Recon is to automate the initial information gathering phase and then enumerate based off those results as much as...
View ArticleLynis 3.0.0 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleSAyHello - Capturing Audio (.Wav) From Target Using A Link
Capturing audio (.wav) from target using a linkHow it works?After the user grants microphone permissions, a website redirect button of your choice is released to distract the target while small audio...
View ArticleTokenBreaker - JSON RSA To HMAC And None Algorithm Vulnerability POC
Token Breaker is focused on 2 particular vulnerability related to JWT tokens.None AlgorithmRSAtoHMACRefer to this link about insights of the vulnerability and how an attacker can forge the tokensTry...
View ArticleInQL - A Burp Extension For GraphQL Security Testing
A security testing tool to facilitate GraphQL technology security auditing efforts.InQL can be used as a stand-alone script or as a Burp Suite extension.InQL Stand-Alone CLIRunning inql from Python...
View ArticleBusiness Secure: How AI is Sneaking into our Restaurants
Prior to pandemic days, the restaurant industry talked of computers that might end up taking over their daily responsibilities. They’d joke about how a kiosk can communicate orders to the kitchen, much...
View ArticleHmmcookies - Grab Cookies From Firefox, Chrome, Opera Using A Shortcut File...
Grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass UAC)Legal disclaimer:Usage of HMMCOOKIES for attacking targets without prior mutual consent is illegal. It's the end user's...
View ArticleSifter 7.4 - OSINT, Recon & Vulnerability Scanner
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote...
View ArticleHow to Free Recover Deleted Files on Your Mac
There are many scenarios where you would want to recover deleted data from your Mac. These deleted files could be your important photos, official documents, financial records, etc. Loss of such data...
View ArticleCorsMe - Cross Origin Resource Sharing MisConfiguration Scanner
A Misconfiguration Scanner cors misconfiguration scanner tool based on golang with speed and precision in mind !Misconfiguration type this scanner can check forReflect Origin checksPrefix MatchSuffix...
View ArticleColabcat - Running Hashcat On Google Colab With Session Backup And Restore
Run Hashcat on Google Colab with session restore capabilities with Google Drive.UsageGo to the link below to open a copy of the colabcat.ipynb file in Google Colab:...
View ArticleSpyse: All-In-One Cybersecurity Search Engine
Spyse is a cybersecurity search engine for finding technical information about different internet entities, business data, and vulnerabilities. It’s an all-in-one platform for fast and effortless...
View ArticleCloudtopolis - Cracking Hashes In The Cloud For Free
Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!).RequirementsHave 1...
View ArticleVBSmin - VBScript Minifier
VBScript minifierFeaturesRemove extra whitespace Trailing whitespaceLeading whitespaceBlank linesInline extra spacesRemove comments Single quote (start of the line)Single quote (inline)REMOne-line Line...
View ArticleScreenspy - Capture user screenshots using shortcut file (Bypass...
Capture user screenshots using shortcut file (Bypass SmartScreen/Defender). Suport Multi-monitorLegal disclaimer:Usage of ScreenSpy for attacking targets without prior mutual consent is illegal. It's...
View ArticleEspionage - A Network Packet And Traffic Interceptor For Linux. Spoof ARP &...
Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows users to to run normal and verbose traffic analysis that shows a live feed...
View ArticleBSF - Botnet Simulation Framework
BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow defenders to evaluate monitoring and countermeasures.SynopsisIn the arms race...
View ArticleXeexe - Undetectable And XOR Encrypting With Custom KEY (FUD Metasploit RAT)
Undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,...(PYTHON 3)Undetectable Reverse shell...
View ArticleEvilNet - Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack...
Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../install :sudo pip3 install -r requirements.txtEvilNet Attack NetworkScan NetworkWifi AttackARP AttackBrute Force...
View ArticleKube-Bench - Checks Whether Kubernetes Is Deployed According To Security Best...
kube-bench is a Go application that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark.Tests are configured with YAML files, making this...
View Article