FestIn - S3 Bucket Weakness Discovery
FestIn is a tool for discovering open S3 Buckets starting from a domains.It perform a lot of test and collects information from:DNSWeb Pages (Crawler)S3 bucket itself (like S3 redirections)Why...
View ArticlePhishingKitTracker - Let's Track Phishing Kits To Give To Research Community...
An extensible and freshly updated collection of phishingkits for forensics and future analysis topped with simple statsDisclaimerThis repository holds a collection of Phishing Kits used by criminals to...
View ArticleSharpAppLocker - C# Port Of The Get-AppLockerPolicy PS Cmdlet
C# port of the Get-AppLockerPolicy PS cmdlet _____ _ ___ _ _/ ___| | / _ \ | | | |\ `--.| |__ __ _ _ __ _ __ / /_\ \_ __ _ __ | | ___ ___| | _____ _ __ `--. \ '_ \ / _` | '__| '_ \| _ | '_ \| '_ \| | /...
View ArticleEvine - Interactive CLI Web Crawler
Evine is a simple, fast, and interactive web crawler and web scraper written in Golang. Evine is useful for a wide range of purposes such as metadata and data extraction, data mining, reconnaissance...
View ArticleIRFuzz - Simple Scanner with Yara Rule
IRFuzz is a simple scanner with yara rules for document archives or any files.Install1. PrerequisitesLinux or OS XYara: just use the latest release source code, compile and install it (or install it...
View ArticleArcane - A Simple Script Designed To Backdoor iOS Packages (Iphone-Arm) And...
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessar y resources for APT repositories. It was created for this publication to help illustrate why Cydia...
View ArticleFlask-Session-Cookie-Manager - Flask Session Cookie Decoder/Encoder
 Flask Session Cookie Decoder/EncoderDepencenciesPython 2 or Python 3itsdangerousFlaskInstallationBlackArch Linux# pacman -S flask-session-cookie-manager{3,2}GitArchLinuxBoth python3 etn python2:$ git...
View ArticlePE Tree - Python Module For Viewing Portable Executable (PE) Files In A...
Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro to dump in-memory PE files and reconstruct imports.FeaturesStandalone...
View ArticleSkyArk - Helps To Discover, Assess And Secure The Most Privileged Entities In...
SkyArk is a cloud security project with two main scanning modules:AzureStealth - Scans Azure environmentsAWStealth - Scan AWS environmentsThese two scanning modules will discover the most privileged...
View ArticleSharpChromium - .NET 4.0 CLR Project To Retrieve Chromium Data, Such As...
SharpChromium is a .NET 4.0+ CLR project to retrieve data from Google Chrome, Microsoft Edge, and Microsoft Edge Beta. Currently, it can extract:Cookies (in JSON format)History (with associated cookies...
View ArticleNautilus - A Grammar Based Feedback Fuzzer
Nautilus is a coverage guided, grammar based fuzzer. You can use it to improve your test coverage and find more bugs. By specifying the grammar of semi valid inputs, Nautilus is able to perform complex...
View ArticleBastillion - A Web-Based SSH Console That Centrally Manages Administrative...
Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and distribution of user's public SSH keys. Key...
View ArticleAWS Report - A Tool For Analyzing Amazon Resources
AWS Report is a tool for analyzing amazon resources.Install using PIPpip install awsreportFeaturesSearch IAM users based on creation dateSearch buckets publicSearch security based in rules, default is...
View ArticleDAGOBAH - Open Source Tool To Generate Internal Threat Intelligence,...
Dagobah is an open source tool written in python to automate the internal threat intelligence generation, inventory collection and compliance check from different AWS resources. Dagobah collects...
View ArticleUnfollow-Plus - Automated Instagram Unfollower Bot
Automated Instagram Unfollower Bot.Installation :apt updateapt install git curl -ygit clone git://github.com/htr-tech/unfollow-plus.gitcd unfollow-plus> Run : bash unfollower.shSingle Command :apt...
View ArticlePhirautee - A PoC Crypto Virus To Spread User Awareness About Attacks And...
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This...
View ArticleCheckXSS - Detect XSS vulnerability in Web Applications
Detect XSSvulnerability in Web ApplicationsScreenshotsEasy InstallationAs simple as below, Just one line of code:curl -L -s...
View ArticleSpybrowse - Code Developed To Steal Certain Browser Config Files (History,...
Be sure to change the ftp variables throughout the code, these variables contain the username, password, & IP address of the FTP server which receives the files.This code will do the following:Copy...
View ArticlePowerSharpPack - Many usefull offensive CSharp Projects wraped into...
Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead because of AMSI, Script-block-logging, Constrained Language...
View ArticleUrlbuster - Powerful Mutable Web Directory Fuzzer To Bruteforce Existing...
Powerful web directory fuzzer to locate existing and/or hidden files or directories.Similar to dirb or gobuster, but with a lot of mutation options.Installationpip install urlbusterFeaturesProxy...
View Article