Obfuscator - The Program Is Designed To Obfuscate The Shellcode
The program is designed to obfuscate the shellcode. Currently the tool supports 2 encryption.1) XOR2) AESThe tool accepts shellcode in 4 formats.1) base642) hex3) c4) rawCommand Line UsageUsage...
View ArticleADSearch - A Tool To Help Query AD Via The LDAP Protocol
A tool written for cobalt-strike's execute-assembly command that allows for more efficent querying of AD.Key FeaturesList all Domain AdminsCustom LDAP SearchConnect to LDAPS ServersOutput JSON data...
View ArticleKarkinos - Penetration Testing And Hacking CTF's Swiss Army Knife With:...
Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following:Encoding/Decoding charactersEncrypting/Decrypting text or...
View ArticleHijackthis - A Free Utility That Finds Malware, Adware And Other Security...
HiJackThis Fork is a free utility for Microsoft Windows that scans your computer for settings changed by adware, spyware, malware and other unwanted programs.HiJackThis Fork primarily detects hijacking...
View ArticleJs-X-Ray - JavaScript And Node.js Open-Source SAST Scanner (A Static Analysis...
JavaScript AST analysis. This package has been created to export the Node-Secure AST Analysis to enable better code evolution and allow better access to developers and researchers.The goal is to...
View ArticleBaphomet - Basic Concept Of How A Ransomware Works
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack our files. This project is written in C# using the net-core application framework 3.1.The main...
View ArticleWp_Hunter - Static Analysis Of Wordpress Plugins
Static analysis to search for vulnerabilities in Wordpress plugins. __ ____________ ___ ___ __ / \ / \______ \/ | \ __ __ _____/ |_ ___________ \ \/\/ /| ___/ ~ \ | \/ \ __\/ __ \_ __ \ \ / | | \ Y / |...
View ArticlePacker-Fuzzer - A Fast And Efficient Scanner For Security Detection Of...
With the popularity of web front-end packaging tools, have you encountered more and more websites represented by Webpack packager in daily penetration testing and security services? This type of...
View ArticleDepix - Recovers Passwords From Pixelized Screenshots
Depix is a tool for recovering passwords from pixelized screenshots.This implementation works on pixelized images that were created with a linear box filter.In this article I cover background...
View ArticleRESTler - The First Stateful REST API Fuzzing Tool For Automatically Testing...
RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services. For a given cloud...
View ArticleDarkSide - Tool Information Gathering And Social Engineering
Features:Hacker DashboardHacker News [thehackernews.com/]New Exploits [Exploit-db.com]Hacking Tutorials Video [youtube.com]The Latest Prices OF Digital Currencies [Rials , Usd]Information...
View ArticleSak1To-Shell - Multi-threaded C2 Server And Reverse Shell Client Written In...
Multi-threaded c2 server and reverse TCP shell client written in pure C (Windows).Command list:list: list available connections.interact [id]: interact with client.download [filename]: download a file...
View ArticleCarnivore - Tool For Assessing On-Premises Microsoft Servers Authentication...
Carnivore is an assessment tool for Skype for Business, Exchange, ADFS, and RDWeb servers as well as some O365 functionality. Carnivore includes some new post-authentication Skype for Business...
View ArticleGustave - Embedded OS kernel fuzzer
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuzz OS kernels like simple applications.Thanks to QEMU, it is...
View Article403Bypasser - Burpsuite Extension To Bypass 403 Restricted Directory
An burpsuite extension to bypass 403 restricted directory. By using PassiveScan (default enabled), each 403 request will be automatically scanned by this extension, so just add to burpsuite and...
View ArticleSlipstream - NAT Slipstreaming Allows An Attacker To Remotely Access Any...
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim's NAT/firewall (arbitrary firewall pinhole control), just by the victim...
View ArticleStegseek - Worlds Fastest Steghide Cracker, Chewing Through Millions Of...
Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built as a fork of the original steghide project and, as a result, it is thousands of times...
View ArticleWSMan-WinRM - A Collection Of Proof-Of-Concept Source Code And Scripts For...
A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object.BackgroundFor background information, please refer to the...
View ArticleToRat - A Remote Administation Tool Written In Go Using Tor As A Transport...
A Cross PlatformRemote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients.How toHow to use ToRatPreviewCurrent FeaturesRPC (Remote...
View ArticleAPKLab - Android Reverse Engineering WorkBench For VS Code
APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the...
View Article