Emp3R0R - Linux Post-Exploitation Framework Made By Linux User
linux post-exploitation framework made by linux userStill under active development中文介绍check my blog for updateshow to usewhat to expect (in future releases)packer: cryptor + memfd_createpacker: use...
View ArticleLongtongue - Customized Password/Passphrase List Inputting Target Info
Customized Password/Passphrase List inputting Target InfoInstallationgit clone https://github.com/edoardottt/longtongue.gitcd longtonguepython3 longtongue.pyUsageusage: longtongue.py [-h] [-p | -c |...
View ArticlePidrila - Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team for all ethical netstalkers.Installation...
View ArticleMUD-Visualizer - A Tool To Visualize MUD Files
This tool can be used to visualize the MUD files in JSON format.MotivationMUD files are plain text files in JSON format that contain ACL rules for a device. A MUD file can contains tens or hundrends of...
View ArticleWprecon - A Vulnerability Recognition Tool In CMS Wordpress, 100% Developed...
Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerabilityrecognition tool in CMS Wordpress, 100% developed in Go.Notice:Why is the project out of updates these days ?! What happens is that I am...
View ArticlepongoOS - A Pre-Boot Execution Environment For Apple Boards
A pre-boot execution environment for Apple boards built on top of checkra1n.Building on macOSInstall Xcode + command-line utilitiesmake clean allBuilding on LinuxDownload Sam Bingner's iOS...
View ArticleSigurls - A Reconnaissance Tool, It Fetches URLs From AlienVault's OTX,...
sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.UsageTo display help message for sigurls use the -h flag:$ sigurls -h _ _...
View ArticleProtOSINT - A Python Script That Helps You Investigate Protonmail Accounts...
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.DescriptionThis tool can help you in your OSINT investigation on Proton service (for educational...
View ArticleRadareEye - A Tool Made For Specially Scanning Nearby devices [BLE, Bluetooth...
A tool made for specially scanning nearby devices[BLE,Bluetooth & Wifi] and execute our given command on our system when the target device comes in between range.NOTE:- RadareEye Owner will be not...
View ArticleUmbrella_android - Digital And Physical Security Advice App
Umbrella is an Android mobile app developed by Security First that provides human rights defenders with the information on what to do in any given security situation and the tools to do it. It allows...
View ArticleK55 - Linux X86_64 Process Injection Utility | Manipulate Processes With...
(pronounced: "kay fifty-five") The K55 payload injection tool is used for injecting x86_64 shellcode payloads into running processes. The utility was developed using modern C++11 techniques as well as...
View ArticlePineapple-MK7-REST-Client - WiFi Hacking Workflow With Pineapple Mark 7 API
PINEAPPLE MK7 REST CLIENTThe leading rogue access point and WiFi pentest toolkit for close access operations.Passive and active attacks analyze vulnerable and misconfigured devices.@HAK5Author::...
View ArticleStegbrute - Fast Steganography Bruteforce Tool Written In Rust Useful For CTF's
stegbrute is a fast steganographybrute force tool written in Rust using also threads to achieve a faster executionDependenciesStegbrute cannot run without steghide!, to install steghide run :apt-get...
View ArticleSsh-Mitm - Ssh Mitm Server For Security Audits Supporting Public Key...
ssh-mitm is an intercepting (mitm) proxy server for security audits.Redirect/mirror Shell to another ssh client supported in 0.2.8Replace File in SCP supported in 0.2.6Replace File in SFTP supported in...
View ArticleByteDance-HIDS - A Cloud-Native Host-Based Intrusion Detection Solution...
ByteDance-HIDS is a Cloud-Native Host-Based Intrusion Detection solution project to provide next-generation Threat Detection and Behavior Audition with modern architecture.ByteDance-HIDS comprises...
View ArticleSysWhispers2 - AV/EDR Evasion Via Direct System Calls
SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls.All core syscalls are supported and example generated files available in the example-output/...
View ArticleMyJWT - A Cli For Cracking, Testing Vulnerabilities On Json Web Token (JWT)
This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc... Check Documentation for more information. If you see problems or enhancement send an issue.I will respond...
View ArticleImHex - A Hex Editor For Reverse Engineers, Programmers And People That Value...
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.FeaturesFeatureful hex view Byte patchingPatch managementCopy bytes as feature BytesHex...
View ArticleToken-Hunter - Collect OSINT For GitLab Groups And Members And Search The...
Collect OSINT for GitLab groups and members and search the group and group members' snippets, issues, and issue discussions for sensitive data that may be included in these assets. The information...
View ArticleBigBountyRecon - This Tool Utilises 58 Different Techniques To Expediate The...
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation. Reconnaissance is the...
View Article